When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 6 modules in this course
This course is primarily aimed at cybersecurity professionals, advanced students, and individuals with foundational knowledge in cybersecurity looking to expand their expertise in ethical hacking and defense strategies. Advanced Cybersecurity Topics provides in-depth coverage of sophisticated security challenges, including rootkits, operating system security, buffer overflow vulnerabilities, race conditions, and post-exploitation techniques. It’s ideal for those who want to deepen their understanding of modern cybersecurity threats and defenses, and are ready to tackle complex scenarios involving system vulnerabilities, privilege escalation, and mitigation strategies. Through hands-on labs and real-world case studies, participants will gain practical experience using the MITRE ATT&CK Enterprise Framework and other ethical hacking methodologies to analyze and defend against advanced attacks. Whether you are a seasoned professional aiming to advance your skills or a cybersecurity student looking to deepen your knowledge, this course equips you with critical tools to face complex security challenges.
The specialization “Introduction to Ethical Hacking” helps you to master essential cybersecurity skills across three comprehensive courses. Begin with Cybersecurity Fundamentals, covering motives, penetration testing, cryptography, information gathering, and social engineering. Progress to Advanced Techniques exploring mobile security, DNS attacks, network exploitation, and web exploitation. Conclude with Advanced Topics on rootkits, OS security, buffer overflow, race conditions, and post-exploitation strategies, preparing you for diverse cybersecurity challenges.
What's included
4 readings
Show info about module content
4 readings•Total 120 minutes
Course Overview•10 minutes
Instructor Biography - Jason Crossland•5 minutes
Recommended Additional Resources•95 minutes
Resources & References•10 minutes
Rootkits
Module 2•7 hours to complete
Module details
Discusses the history, types, forms, and goals of rootkits. Covers system calls, kernel vs. user space, hooking, loadable kernel modules, testing system calls, and tweaking files.
Understanding Rootkits and Kernel Space•15 minutes
Manipulating System Integrity with LKMs•15 minutes
Rootkits•60 minutes
OS Security
Module 3•11 hours to complete
Module details
Discusses the goals, purposes, techniques, and tools used for conducting OS security activities. Covers trusted computing, design, access control, SETUID, certification service, authenticate boot service, root shell, password shadow file, and single-user mode.
What's included
6 videos5 readings3 assignments
Show info about module content
6 videos•Total 86 minutes
OS Security•10 minutes
Trust and OS•10 minutes
OS Design•13 minutes
Access Control•17 minutes
OS Vulnerability•18 minutes
SETUID•18 minutes
5 readings•Total 460 minutes
Reading References•90 minutes
Optional Readings•120 minutes
Reading References•90 minutes
Optional Readings•120 minutes
Self-Reflective Reading: OS Vulnerabilities•40 minutes
3 assignments•Total 90 minutes
Fundamentals of OS Security•15 minutes
Advanced OS Security Techniques•15 minutes
OS Security•60 minutes
Buffer Overflow
Module 4•14 hours to complete
Module details
Discusses the goals, objectives, history, methods/approaches, and tools used to conduct buffer overflow activities. Covers “smashing the stack,” X86 Architecture, memory organization, stack behavior, Seg Fault example, modifying execution flow, shell code, and null characters.
What's included
10 videos5 readings3 assignments
Show info about module content
10 videos•Total 82 minutes
Introduction•14 minutes
X86 Architecture•10 minutes
Memory Organization•6 minutes
Stack Behavior•10 minutes
Seg Fault•3 minutes
Modifying Execution•11 minutes
Understanding Shell Code•8 minutes
Shell Code Addressing•10 minutes
Creating Shell Code•6 minutes
Null Character•5 minutes
5 readings•Total 640 minutes
Reading References•120 minutes
Additional Readings•180 minutes
Reading References•120 minutes
Additional Readings•180 minutes
Self-Reflective Reading: A Journey through Security Protections•40 minutes
3 assignments•Total 90 minutes
Foundations of Buffer Overflow•15 minutes
Exploiting Buffer Overflows•15 minutes
Buffer Overflow•60 minutes
Race Conditions
Module 5•6 hours to complete
Module details
Discusses the goals, objectives, history, methods/approaches, and tools used to conduct Return-Oriented Programming (ROP) & Race Condition activities.
What's included
1 video3 readings2 assignments1 plugin
Show info about module content
1 video•Total 11 minutes
Race Conditions Fundamentals•11 minutes
3 readings•Total 250 minutes
Reading References•90 minutes
Additional Readings: Studies to Answer Self-Reflective Reading Questions •120 minutes
Self-Reflective Reading: Meltdown and Spectre•40 minutes
2 assignments•Total 75 minutes
Advanced Techniques in Cyber Exploitation•15 minutes
Race Conditions•60 minutes
1 plugin•Total 15 minutes
Race Condition Vulnerability•15 minutes
Post Exploitation (Escalate/Pivot)
Module 6•10 hours to complete
Module details
Discusses of the history, types, forms, goals, and tools used for privilege escalation activities. Covers preventing and examples of escalation, island hopping/pivoting, maintaining persistence/C2, data hiding, and maintaining your presence (i.e., log control).
What's included
5 videos5 readings3 assignments
Show info about module content
5 videos•Total 59 minutes
Post Exploitation•8 minutes
Data Hiding•8 minutes
Hiding Your Presence: Log Control •6 minutes
Island Hopping/Pivoting•17 minutes
Persistence•19 minutes
5 readings•Total 460 minutes
Reading References and Shells•90 minutes
Unix Shell Programming: The Next 50 Years•120 minutes
Reading References and Shells•90 minutes
Unix Shell Programming: The Next 50 Years•120 minutes
The mission of The Johns Hopkins University is to educate its students and cultivate their capacity for life-long learning, to foster independent and original research, and to bring the benefits of discovery to the world.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.