Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Johns Hopkins University

Advanced Cybersecurity Techniques

Johns Hopkins University via Coursera

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
The course "Advanced Cybersecurity Techniques" delves into advanced cybersecurity methodologies, equipping learners with practical skills to tackle complex security challenges. Covering critical topics such as mobile device vulnerabilities, DNS attacks, network exploitation, web application security, and Wi-Fi exploitation, participants will gain hands-on experience through practical labs and real-world scenarios. Learners will benefit from a comprehensive understanding of the latest attack vectors and mitigation strategies, enhancing their ability to safeguard digital environments. The course emphasizes ethical hacking methodologies, utilizing the MITRE ATT&CK Enterprise Framework to provide a structured approach to understanding cyber exploits.

Syllabus

  • Course Introduction
    • This course delves into advanced ethical hacking techniques and security vulnerabilities in mobile devices, networks, and web applications. Participants will explore critical threats, such as the NSO three-stage attack on iOS, various DNS attacks, and common web exploitation risks. Utilizing the MITRE ATT&CK Enterprise Framework and ethical hacking labs, students will develop practical skills in penetration testing and vulnerability assessment. By the end, they will be equipped to identify and mitigate security risks effectively in diverse environments.
  • Mobile Devices & DNS attacks
    • Discusses the concepts and methodologies for exploiting mobile device platforms.
  • Scanning & Reconnaissance
    • Discusses the goals, objectives, methods/approaches, and tools used in the scanning and reconnaissance phase.
  • Network Exploitation
    • Discusses the goals, objectives, methods/approaches, and tools used to conduct network exploitation activities. Covers the importance of why network exploitation is done and how to “sniff” certain data objects.
  • Web Exploitation
    • Discusses the Top Ten Open Web Application Security Project (OWASP) attacks, approaches, methodologies, and tools used in web application security.
  • Wi-Fi Exploitation
    • Discusses the most common and current techniques/methods for gaining access to wireless networks, IEEE, and 802.11 protocols for connection, handshake, and authentication. Covers beacons, probes, tactics and tools used for WEP, WPA, WPA2, & WPA3.

Taught by

Jason Crossland

Reviews

Start your review of Advanced Cybersecurity Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.