Packt
System Hacking, Malware Threats, and Network Attacks
Packt

System Hacking, Malware Threats, and Network Attacks

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

19 hours to complete
3 weeks at 6 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

19 hours to complete
3 weeks at 6 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Master enumeration techniques using protocols like SMB, SNMP, and LDAP.

  • Develop strategies for effective vulnerability assessment and management.

  • Execute advanced system hacking techniques, including privilege escalation.

  • Analyze malware types and deploy countermeasures to mitigate threats.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

February 2025

Assessments

8 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Certified Ethical Hacker (CEH) v.12 Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 7 modules in this course

In this module, we will dive into enumeration techniques essential for uncovering critical information about target systems. You will learn how to leverage protocols like SMB, SNMP, LDAP, and others to gather data and explore methods for enumerating email systems and file-sharing services. These skills will enable you to expand on initial reconnaissance and uncover actionable insights for penetration testing.

What's included

6 videos2 readings1 assignment

In this module, we will explore the process of vulnerability analysis, including assessment concepts, classifications, and lifecycle stages. You will gain hands-on knowledge of tools, assessment types, and models to uncover and manage system weaknesses effectively. This module equips you with the necessary skills to conduct thorough assessments and present actionable insights through detailed vulnerability reports.

What's included

6 videos1 assignment

In this module, we will delve into the core hacking techniques used in ethical hacking operations. You’ll explore Windows authentication methods, password attacks, buffer overflow exploitation, and privilege escalation. Additionally, we will cover post-exploitation techniques such as maintaining access, covering tracks, and pivoting. By the end of this module, you’ll have a well-rounded understanding of system hacking tactics and their countermeasures

What's included

13 videos1 assignment

In this module, we will examine the different types of malware, their characteristics, and their deployment methods. From traditional viruses and worms to sophisticated threats like APTs and fileless malware, you’ll gain insights into their behavior and impacts. You’ll also learn about malware analysis techniques and explore countermeasures to protect systems against these persistent threats.

What's included

7 videos1 assignment

In this module, we will uncover the techniques attackers use to intercept sensitive data through network sniffing. You’ll learn about protocols and vulnerabilities exploited in attacks like ARP poisoning and DNS spoofing, and you’ll explore countermeasures to secure network communications. These skills will help you identify and protect against interception threats effectively.

What's included

5 videos1 assignment

In this module, we will delve into the human aspect of cybersecurity—social engineering. You’ll explore techniques attackers use to exploit human vulnerabilities, including identity theft and insider threats. By understanding these attack methods, you’ll be better equipped to implement preventative strategies and foster a security-aware culture within organizations.

What's included

3 videos1 assignment

In this module, we will focus on denial-of-service (DoS) attacks, one of the most disruptive forms of cyber threats. You’ll explore the mechanics of attacks like volumetric floods, SYN floods, and SlowLoris, and you’ll learn about botnets’ role in amplifying their impact. By understanding these threats, you’ll be able to design effective countermeasures to safeguard systems against service disruptions.

What's included

6 videos1 reading2 assignments

Instructor

Packt - Course Instructors
Packt
567 Courses49,621 learners

Offered by

Packt

Recommended if you're interested in Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions