This is the 8th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. We recommend taking them in order, unless you have a background in these areas already and feel comfortable skipping ahead.
Information Security - Introduction to Information Security
Information Security - Authentication and Access Control
Information Security - Advanced Topics
Network Security - Introduction to Network Security
Network Security - Protocols
Network Security - Advanced Topics
Penetration Testing - Discovering Vulnerabilities
Penetration Testing - Exploitation
Penetration Testing - Post Exploitation
These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor.
This is a self-paced course that continues the development of ethical hacking skills. The curriculum provides an introduction to post-exploitation penetration testing topics. Among the topics covered are Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics, The purpose of the Post-Exploitation phase is to determine the value of the machine compromised and to maintain control of the device for later use. The machine's value is determined by the sensitivity of the data stored on it and the machine's usefulness in further compromising the network. The methods the students learn in this phase are meant to help them identify and document sensitive information, identify configuration settings, communication channels, and relationships with other network devices that can be used to gain further access to the network. The students also learn how to set up one or more methods of accessing the machine later.
Industry Certification Preparation
This program covers much of the material that is assessed on the CompTIA’s Security+ certification exam. Upon program completion, verified track learners will receive a 36% discount code for the CompTIA Security+ exam.
If you are enrolled in the verified track (paid track) in any course that is a part of a MicroBachelors program, including this course, you are eligible for coaching at no additional cost. Please note that coaching is only available via SMS to U.S. phone lines.
Our coaches (real humans) are ready to help you with career exploration, navigating resources, staying motivated, and solving problems along the way to your goals.
Learn more about the value of coaching directly from one of our coaches, Erin.
Week 1 - Post Exploitation - Owning, Pivoting, Privilege Escalation
Week 2 - Review of Web App Exploits
Week 3 - Exploitation – Passwords and Authentication