Packt
Hands-on Hacking
Packt

Hands-on Hacking

Included with Coursera Plus

Learn more
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

17 hours to complete
3 weeks at 5 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

17 hours to complete
3 weeks at 5 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Perform advanced enumeration and scanning to identify vulnerable services and systems.

  • Exploit web apps, decrypt HTTPS traffic, and simulate real-world access and escalation attacks.

  • Develop and execute custom exploits using fuzzing, buffer overflow, and shellcode injection.

  • Practice pivoting and escalation techniques across complex multi-machine environments.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

May 2025

Assessments

9 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal
Coursera Career Certificate

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Coursera Career Certificate

There are 8 modules in this course

In this module, we will explore a full attack lifecycle against a target system, starting with reconnaissance and ending with full administrative access. You’ll use tools like Burp Suite and Wireshark to analyze encrypted traffic, uncover hidden vulnerabilities, and exploit misconfigured services. The journey includes both horizontal and vertical privilege escalation to achieve total system compromise.

What's included

8 videos1 reading1 assignment

In this module, we will take on the GoldenEye vulnerable VM to strengthen your offensive security skills. You'll work through advanced enumeration techniques across web and email services to uncover credentials and vulnerable software. From initial access to full root shell, this module builds your skillset for real-world penetration testing scenarios.

What's included

6 videos1 assignment

In this module, we will target the vulnerable Bob VM to walk through the process of system compromise. You’ll analyze web application behavior, test for injection flaws, and exploit vulnerabilities to gain shell access. Then, through creative privilege escalation, you’ll achieve root access—using both standard and alternate methods for maximum learning.

What's included

5 videos1 assignment

In this module, we will transition from exploitation to exploit development. You’ll learn how to build exploits from scratch by fuzzing for vulnerabilities, manipulating buffer offsets, and avoiding bad characters. The journey concludes with the development of a custom shellcode to gain remote access, reinforcing your understanding of memory manipulation and code execution.

What's included

6 videos1 assignment

In this module, we will navigate the misdirection-filled terrain of a specially crafted VM. You’ll enhance your reconnaissance and enumeration skills while exploring multiple web apps and navigating false leads. After gaining access, you'll apply privilege escalation methods and look for alternate paths to root access, mimicking a thorough real-world assessment.

What's included

4 videos1 assignment

In this module, we will take on a dual-VM challenge involving Straylight and Neuromancer. You’ll perform advanced enumeration, exploit LFI and email servers, and then pivot through port forwarding to access and compromise a second system. You'll wrap up with privilege escalation techniques, learning to chain attacks across multiple targets.

What's included

8 videos1 assignment

In this module, we will focus on Windows environments—particularly Active Directory systems. You’ll scan networks, exploit weak configurations, and access services such as MS-SQL using compromised credentials. This section strengthens your understanding of Windows privilege escalation and post-exploitation tactics.

What's included

4 videos1 assignment

In this module, we will tackle the FunBox2 VM to showcase real-world exploitation techniques. You’ll use enumeration skills to uncover a weak password, escape from a jailed shell, and then escalate privileges by uncovering sensitive information. The module offers a practical look into the nuances of post-exploitation.

What's included

4 videos2 assignments

Instructor

Packt - Course Instructors
Packt
679 Courses103,054 learners

Offered by

Packt

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Security? Start here.

Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions