Step into the world of ethical hacking with this hands-on course designed for beginners. Learn the core principles of cybersecurity, including the CIA and DAD triads, common vulnerabilities, and hacking methodologies. Explore real-world cyber threats such as malware, ransomware, phishing, and social engineering, while discovering how hackers exploit weaknesses in networks and systems.



Empfohlene Erfahrung
Was Sie lernen werden
Understand key cybersecurity concepts, threats, and hacking methodologies.
Set up and use Kali Linux, NMAP, and other ethical hacking tools.
Perform network scanning, password cracking, and phishing simulations.
Develop cybersecurity strategies for risk mitigation and incident response.
Wichtige Details

Zu Ihrem LinkedIn-Profil hinzufügen
April 2025
11 Aufgaben
Erfahren Sie, wie Mitarbeiter führender Unternehmen gefragte Kompetenzen erwerben.


Erwerben Sie ein Karrierezertifikat.
Fügen Sie diese Qualifikation zur Ihrem LinkedIn-Profil oder Ihrem Lebenslauf hinzu.
Teilen Sie es in den sozialen Medien und in Ihrer Leistungsbeurteilung.

In diesem Kurs gibt es 12 Module
In this module, we will introduce the fundamentals of cybersecurity and explore why it is a critical field today. We will discuss cybersecurity as a career path, the risks associated with poor security practices, and set the stage for the skills you will develop throughout the course.
Das ist alles enthalten
1 Video1 Lektüre
In this module, we will explore the core principles of cybersecurity, such as the CIA and DAD triads, which define the security landscape. You will also learn about key cybersecurity vulnerabilities, how they are classified, and why understanding them is essential for effective security defense.
Das ist alles enthalten
4 Videos1 Aufgabe
In this module, we will revisit critical cyber threats, focusing on different hacker profiles, their motivations, and the techniques they use to compromise systems. We will also dive into malware, ransomware, social engineering, and the methodologies behind cyber-attacks.
Das ist alles enthalten
6 Videos1 Aufgabe
In this module, we will focus on virtualization and Kali Linux, essential tools for ethical hackers. You will learn how to install VirtualBox and Kali Linux, troubleshoot common installation issues, and get hands-on experience using Linux commands for cybersecurity tasks.
Das ist alles enthalten
7 Videos1 Aufgabe
In this module, we will explore phishing, one of the most prevalent cyber threats. You will learn about phishing techniques, how attackers create fake websites and emails, and how to recognize and defend against these attacks effectively.
Das ist alles enthalten
7 Videos1 Aufgabe
In this module, we will delve into network security, covering fundamental concepts such as IP addressing, protocols, and firewalls. You will also learn about home network setups, secure configurations, and how to strengthen networks against attacks.
Das ist alles enthalten
13 Videos1 Aufgabe
In this module, we will explore NMAP, one of the most powerful tools for network scanning. You will learn how to install NMAP, use different scanning techniques, analyze port states, and apply scripting for advanced security assessments.
Das ist alles enthalten
11 Videos1 Aufgabe
In this module, we will focus on password security and cracking techniques. You will learn about hashing, how to use PowerShell for hash calculations, and different brute-force attack methods to understand vulnerabilities in password security.
Das ist alles enthalten
9 Videos1 Aufgabe
In this module, we will explore web security concepts, covering how websites work, their underlying technologies, and potential vulnerabilities. You will learn how attackers exploit web weaknesses and how to use security tools to test and secure websites.
Das ist alles enthalten
13 Videos1 Aufgabe
In this module, we will cover reconnaissance, a crucial phase in ethical hacking. You will learn how to gather intelligence using Maltego, analyze target infrastructures, and develop effective strategies for penetration testing.
Das ist alles enthalten
8 Videos1 Aufgabe
In this module, we will explore cybersecurity management, incident response, and auditing. You will learn how to prevent data leaks, create recovery plans, and conduct security audits to strengthen an organization’s cybersecurity posture.
Das ist alles enthalten
7 Videos1 Aufgabe
In this final module, we will summarize the key lessons learned throughout the course. We will also discuss the importance of staying updated in cybersecurity and provide guidance on the next steps for your ethical hacking journey.
Das ist alles enthalten
1 Video1 Aufgabe
Dozent

von
Warum entscheiden sich Menschen für Coursera für ihre Karriere?





Neue Karrieremöglichkeiten mit Coursera Plus
Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten
Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.
Erwerben Sie einen Abschluss von erstklassigen Universitäten – 100 % online
Schließen Sie sich mehr als 3.400 Unternehmen in aller Welt an, die sich für Coursera for Business entschieden haben.
Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.
Häufig gestellte Fragen
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
Weitere Fragen
Finanzielle Unterstützung verfügbar,