Johns Hopkins University
Advanced Cybersecurity Topics
Johns Hopkins University

Advanced Cybersecurity Topics

Jason Crossland

Instructor: Jason Crossland

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

48 hours to complete
3 weeks at 16 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

48 hours to complete
3 weeks at 16 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Defend against rootkits, OS vulnerabilities, and buffer overflow attacks.

  • Identify and exploit race conditions while implementing mitigation strategies.

  • Apply post-exploitation techniques, including privilege escalation and pivoting.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

October 2024

Assessments

14 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Introduction to Ethical Hacking Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 6 modules in this course

The specialization “Introduction to Ethical Hacking” helps you to master essential cybersecurity skills across three comprehensive courses. Begin with Cybersecurity Fundamentals, covering motives, penetration testing, cryptography, information gathering, and social engineering. Progress to Advanced Techniques exploring mobile security, DNS attacks, network exploitation, and web exploitation. Conclude with Advanced Topics on rootkits, OS security, buffer overflow, race conditions, and post-exploitation strategies, preparing you for diverse cybersecurity challenges.

What's included

4 readings

Discusses the history, types, forms, and goals of rootkits. Covers system calls, kernel vs. user space, hooking, loadable kernel modules, testing system calls, and tweaking files.

What's included

7 videos5 readings3 assignments

Discusses the goals, purposes, techniques, and tools used for conducting OS security activities. Covers trusted computing, design, access control, SETUID, certification service, authenticate boot service, root shell, password shadow file, and single-user mode.

What's included

6 videos5 readings3 assignments

Discusses the goals, objectives, history, methods/approaches, and tools used to conduct buffer overflow activities. Covers “smashing the stack,” X86 Architecture, memory organization, stack behavior, Seg Fault example, modifying execution flow, shell code, and null characters.

What's included

10 videos5 readings3 assignments

Discusses the goals, objectives, history, methods/approaches, and tools used to conduct Return-Oriented Programming (ROP) & Race Condition activities.

What's included

1 video3 readings2 assignments1 plugin

Discusses of the history, types, forms, goals, and tools used for privilege escalation activities. Covers preventing and examples of escalation, island hopping/pivoting, maintaining persistence/C2, data hiding, and maintaining your presence (i.e., log control).

What's included

5 videos5 readings3 assignments

Instructor

Jason Crossland
Johns Hopkins University
3 Courses68 learners

Offered by

Recommended if you're interested in Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions