This hands-on course guides you through the real-world practice of penetration testing, providing an end-to-end look at what it takes to become a skilled ethical hacker. You'll learn the full lifecycle of a pentest—from the initial client engagement and legal preparations to exploitation, documentation, and final reporting. Whether you're an aspiring pentester or a blue teamer looking to understand offense better, this course has you covered.



Expérience recommandée
Ce que vous apprendrez
Master the stages of a pentesting engagement from reconnaissance to final deliverables.
Gain practical experience in using industry-standard tools like Nmap, Nessus, and BurpSuite for vulnerability scanning.
Learn how to exploit vulnerabilities, maintain access, and cover tracks in a pentesting environment.
Understand the role of Blue Team insights in strengthening security through pentesting methodologies.
Compétences que vous acquerrez
- Catégorie : Data Security
- Catégorie : Cyber Security Strategy
- Catégorie : Test Tools
- Catégorie : Authorization (Computing)
- Catégorie : Computing Platforms
- Catégorie : Vulnerability Scanning
- Catégorie : Cyber Security Assessment
- Catégorie : Technical Communication
- Catégorie : Cybersecurity
- Catégorie : Command-Line Interface
- Catégorie : Penetration Testing
- Catégorie : Technical Documentation
- Catégorie : Application Security
- Catégorie : Vulnerability Assessments
Détails à connaître

Ajouter à votre profil LinkedIn
mai 2025
10 devoirs
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées


Obtenez un certificat professionnel
Ajoutez cette qualification à votre profil LinkedIn ou à votre CV
Partagez-le sur les réseaux sociaux et dans votre évaluation de performance

Il y a 9 modules dans ce cours
In this module, we will introduce you to the fundamentals of practical pentesting, exploring key elements like pre-engagement activities, the different stages of an assessment, and the skills required for effective pentesting. You’ll learn about authorization and engagement strategies that ensure a successful pentesting process.
Inclus
2 vidéos1 lecture1 devoir
In this module, we will delve into the essential pre-engagement activities for a pentester, including gathering requirements from the client, ensuring proper authorization, and drafting a comprehensive Statement of Work. You’ll also explore blue team considerations that help shape an engagement.
Inclus
2 vidéos1 devoir
In this module, we will explore the significance of data security agreements and non-disclosure agreements (NDAs) in pentesting. You’ll understand the importance of safeguarding sensitive information and how to implement proper protocols for securing data throughout the pentest.
Inclus
1 vidéo1 devoir
In this module, we will guide you through the principles of crafting an effective Statement of Work (SOW) for pentesting engagements. You will learn how to define scope, rules of engagement, and establish clear expectations to drive successful results.
Inclus
3 vidéos1 devoir
In this module, we will cover the final authorization process, a crucial document that grants permission for pentesters to perform security assessments. You’ll learn what this form includes and why it is essential for ensuring both legal protection and engagement success.
Inclus
1 vidéo1 devoir
In this module, we will discuss the personal toolkit essential for pentesting. We’ll explore the hardware and software that pentesters use in the field to effectively identify and exploit vulnerabilities, helping you prepare for a range of engagement scenarios.
Inclus
1 vidéo1 devoir
In this module, we will explore various pentesting platforms, such as Kali, Parrot, and Black Arch. You’ll learn about the capabilities of each, their differences, and how to select the right one for your pentesting needs.
Inclus
1 vidéo1 devoir
In this module, we will take you through the various stages of a pentesting assessment, from validating scope and conducting reconnaissance to scanning for vulnerabilities and exploiting weaknesses. You’ll also learn how to maintain access and cover your tracks during assessments.
Inclus
9 vidéos1 devoir
In this module, we will shift focus to how blue teams can utilize pentesting techniques to strengthen their security posture. Through a real-world case study, you’ll learn how to assess and defend against attacks, enhancing your overall cybersecurity approach.
Inclus
1 vidéo2 devoirs
Instructeur

Offert par
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?





Ouvrez de nouvelles portes avec Coursera Plus
Accès illimité à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.
Faites progresser votre carrière avec un diplôme en ligne
Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne
Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires
Améliorez les compétences de vos employés pour exceller dans l’économie numérique
Foire Aux Questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
Plus de questions
Aide financière disponible,