We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Credential Access, discovery, lateral movement & collection

Howard Poston

This course covers credential Access, discovery, lateral movement & collection.

Enroll now

What's inside

Syllabus

Python for credential access
A look at credentials and Python.
Python for Discovery
Exploring Python and MITREs Discovery Technique
Read more
Python for Lateral Movement
The use of Python for lateral movement in a target network
Python for collection
Exploring Python and data collection

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers fundamentals of credential access, discovery, lateral movement, and collection
Focuses on Python programming language and its application in cybersecurity
Introduces MITRE ATT&CK framework and its relevance in the context of credential access and discovery
Involves hands-on exercises and case studies to enhance practical skills

Save this course

Save Credential Access, discovery, lateral movement & collection to your list so you can find it easily later:
Save

Reviews summary

Practical hacking techniques

Learners say this course offers practical, hands-on experience with hacking and related security strategies using Python. According to reviews, the course is well-taught, engaging, and eye-opening. Students also praise the inclusion of MITRE ATT&CK framework and the direct application of Python code examples for both offense and defense. Some acknowledge the challenge of quizzes, but the majority of reviews express appreciation for the clear explanations and useful content provided throughout the course.
Python for Offense and Defense
"L​earned how Python can be used for Offense and Defense in Cyber Security used at all stages of the MITRE ATT&CK."
Engaging and Practical
"Awesome Course to Learn"
"Very good dive into practical hacking."
"Specifically and professionally handed over, thank you."
Challenging Quizzes
"N​ice Course and Specialization, but quizes could cause mental demage sometimes ;)I​ believe this is the specific of the field))"

Activities

Coming soon We're preparing activities for Credential Access, discovery, lateral movement & collection. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Credential Access, discovery, lateral movement & collection will develop knowledge and skills that may be useful to these careers:
Systems Analyst
Systems Analysts implement, improve, and troubleshoot solutions to improve organizational efficiency. This course instructs students on how to access, discover, laterally move, and collect credentials in Python. Such knowledge may greatly enhance a Systems Analyst's ability to troubleshoot IT systems, investigate security incidents, and implement security controls.
Information Technology Auditor
Information Technology Auditors examine an organization's IT systems and practices to ensure compliance with regulations and standards. This course may be useful to an Information Technology Auditor as it teaches students Python, a language often used in security auditing tools. This knowledge may help IT Auditors identify vulnerabilities, assess risks, and make recommendations for improvement.
Network Security Engineer
Network Security Engineers design, implement, and maintain secure network infrastructures. This course may be useful to a Network Security Engineer as it teaches students how to access, discover, laterally move, and collect credentials in Python. This knowledge may assist Network Security Engineers in detecting and responding to security incidents, investigating network breaches, and implementing security measures.
Information Security Analyst
Information Security Analysts identify, assess, and mitigate information security risks. This course may be useful to an Information Security Analyst as it teaches students how to access, discover, laterally move, and collect credentials in Python. This knowledge may assist Information Security Analysts in conducting security assessments, investigating security incidents, and developing security policies and procedures.
Cybersecurity Analyst
Cybersecurity Analysts identify, analyze, and respond to cybersecurity threats. This course may be useful to a Cybersecurity Analyst as it provides instruction on credential access, discovery, lateral movement, and collection in Python. This knowledge can assist Cybersecurity Analysts in conducting threat investigations, incident response, and vulnerability assessments.
Security Engineer
Security Engineers design, implement, and maintain security systems and controls. This course may be useful to a Security Engineer as it provides instruction on credential access, discovery, lateral movement, and collection in Python. This knowledge can assist Security Engineers in implementing and maintaining security measures, conducting security assessments, and responding to security incidents.
Forensic Analyst
Forensic Analysts investigate and analyze computer systems and data to uncover evidence of criminal activity. This course may be useful to a Forensic Analyst as it provides instruction on credential access, discovery, lateral movement, and collection in Python. This knowledge can assist Forensic Analysts in retrieving and analyzing digital evidence, conducting investigations, and presenting findings in court.
Security Consultant
Security Consultants provide guidance and advice to organizations on security matters. This course may be useful to a Security Consultant as it provides instruction on credential access, discovery, lateral movement, and collection in Python. This knowledge can assist Security Consultants in assessing security risks, developing security strategies, and implementing security measures.
Malware Analyst
Malware Analysts identify, analyze, and mitigate malware threats. This course may be useful to a Malware Analyst as it teaches students how to access, discover, laterally move, and collect credentials in Python. This knowledge can assist Malware Analysts in detecting and analyzing malware, developing countermeasures, and conducting threat intelligence.
Penetration Tester
Penetration Testers identify and exploit vulnerabilities in computer systems and networks. This course may be useful to a Penetration Tester as it teaches students how to access, discover, laterally move, and collect credentials in Python. This knowledge can assist Penetration Testers in conducting penetration tests, identifying vulnerabilities, and developing exploit strategies.
Ethical Hacker
Ethical Hackers use their skills to identify and exploit vulnerabilities in computer systems and networks to help organizations improve their security posture. This course may be useful to an Ethical Hacker as it teaches students how to access, discover, laterally move, and collect credentials in Python. This knowledge can assist Ethical Hackers in conducting penetration tests, identifying vulnerabilities, and developing exploit strategies.
Security Researcher
Security Researchers identify and analyze new security vulnerabilities and threats. This course may be useful to a Security Researcher as it provides instruction on credential access, discovery, lateral movement, and collection in Python. This knowledge can assist Security Researchers in developing new security tools and techniques, conducting threat intelligence, and publishing research findings.
Threat Intelligence Analyst
Threat Intelligence Analysts collect, analyze, and disseminate information about cyber threats. This course may be useful to a Threat Intelligence Analyst as it teaches students how to access, discover, laterally move, and collect credentials in Python. This knowledge can assist Threat Intelligence Analysts in gathering threat intelligence, conducting threat analysis, and developing threat mitigation strategies.
Incident Responder
Incident Responders investigate and respond to security incidents. This course may be useful to an Incident Responder as it provides instruction on credential access, discovery, lateral movement, and collection in Python. This knowledge can assist Incident Responders in identifying the scope and impact of security incidents, containing threats, and restoring normal operations.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security measures for cloud computing environments. This course may be useful to a Cloud Security Engineer as it provides instruction on credential access, discovery, lateral movement, and collection in Python. This knowledge can assist Cloud Security Engineers in securing cloud infrastructure, protecting data, and complying with regulatory requirements.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Credential Access, discovery, lateral movement & collection.
Provides a comprehensive overview of network security assessment techniques. It covers important topics such as network reconnaissance, vulnerability assessment, and penetration testing.
Provides a practical guide to penetration testing. It covers important topics such as reconnaissance, vulnerability assessment, and exploitation.
Provides a comprehensive guide to using Metasploit for penetration testing. It covers important topics such as reconnaissance, vulnerability assessment, and exploitation.
Provides a comprehensive overview of web application security. It covers important topics such as web application reconnaissance, vulnerability assessment, and exploitation.
Provides a comprehensive overview of exploitation techniques. It covers important topics such as buffer overflows, format strings, and return-oriented programming.
Provides a comprehensive overview of ethical hacking. It covers important topics such as reconnaissance, vulnerability assessment, and exploitation.
Provides a comprehensive overview of malware analysis. It covers important topics such as malware detection, analysis, and remediation.
Provides a comprehensive overview of computer security. It covers important topics such as security principles, threats, and countermeasures.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser