Coursera
在线学位寻找职业企业版面向大学
  • 浏览
  • 顶级课程
  • 登录
  • 免费加入
    Coursera
    • 浏览
    • Pen Testing

    筛选依据

    ''pen testing'的 1 个结果

    • Coursera Project Network

      Coursera Project Network

      Write your own Python tool to footprint a web application

      3.7

      (7 条评论)

      Intermediate · Rhyme Project · Less Than 2 Hours

    1

    总之,这是我们最受欢迎的 pen testing 门课程中的 10 门

    • Write your own Python tool to footprint a web application: Coursera Project Network

    您可以在 Computer Security And Networks 中学到的技能

    网络安全 (33)
    Google (25)
    Google 云端平台 (17)
    互联网 (17)
    密码学 (16)
    网络安全 (16)
    Linux (12)
    软件测试 (12)
    信息安全 (10)
    应用程序接口 (8)
    Kubernetes (8)
    网络 (8)

    关于 Pen Testing 的常见问题

    • Penetration testing, commonly referred to as pen testing or “ethical hacking,” is the process of conducting a simulated cyber attack on an organization’s computer system. Pen testing is an important technique used by cybersecurity professionals for exposing database vulnerabilities and network security flaws that could be exploited by hackers. With so much of today’s critical business as well as personal information accessible through the internet, cyber attacks can be incredibly costly or even dangerous, making this process of identifying vulnerabilities essential.

      Pen tests may use a variety of methods to execute a cyber attack, including brute force attacks, SQL injection, phishing, or even hardware devices. In order to simulate real-world cyber attacks as closely as possible, a “single-blind” test is typically carried out by an outside cybersecurity or IT security analyst with no prior knowledge of the network security systems in place, and in a “double-blind” test the company’s own IT and cybersecurity team is not given advance notice. Pen testing procedures also vary depending on whether the organization wants to simulate an external attack from an outside hacker or an internal attack from a disgruntled employee.‎

    • Pen testing is an essential part of the toolkit of IT security analysts and cybersecurity consultants, who are responsible for helping companies protect their computer networks and systems against malicious cyber attacks. Unknown network security vulnerabilities can lead to incredibly costly data breaches, potentially exposing private information of an organization, its employees, and its customers, making the identification of these flaws a critically important part of cybersecurity.

      Given the elevated and increasing importance of cybersecurity today, professionals in this field are highly sought after. According to the Bureau of Labor Statistics, information security analysts earned a median annual salary of $99,730 in 2019, and these jobs are expected to grow by 31% between 2019 and 2029 - much faster than average job growth across the rest of the economy.‎

    • Certainly. Coursera offers many opportunities to learn about penetration testing and other cybersecurity topics, including individual courses and Specializations spanning multiple courses. You can learn from top-ranked schools like University of California Davis, University of Maryland College Park, University of Colorado, and the University of London, or you can take courses from IBM to earn a professional certificate in cybersecurity. Regardless of where you want to learn from, Coursera lets you view course materials and complete coursework on a flexible schedule so that you can add these important cybersecurity skills to your resume while continuing to pursue your other schoolwork or existing career.‎

    • Because penetration testing isn't a beginner-level skill, you should have a solid technical background in basic Unix commands, software development, and using Linux. Without this experience and skill set, you'll likely struggle with learning pen testing. You should also have a good foundation in the basics of coding, particularly full-stack skills, including Python, JavaScript, CSS, and HTML. Some classes may have other prerequisites, such as having an understanding of TCP/IP, networking, and/or Bash scripting.‎

    • If you have a strong drive to understand how things work and to beat hackers at their own game, then learning penetration testing might be the ideal subject for you. As a pen tester, you'll be tasked with finding and fixing vulnerabilities, including ones that were previously unknown. You'll also discover how an attack would impact a business and assess how effectively organizations are able to respond and detect attacks. If working on the front lines in the war against hackers and those who threaten cybersecurity sounds exciting, learning pen testing will get you on your way to creating a career doing just that.‎

    • Although you don't need a degree to build a career in penetration testing, gaining a formal education in computer science or computer security can help you develop some of the skills you'll need. Common undergraduate degrees for people interested in this field include information security, computer engineering, cybersecurity, and math. Some penetration testers go on to earn their master's degree in cybersecurity or a related field while others go on to work as a network or systems administrator before pursuing certification. Some of the most common certifications include the Certified Ethical Hacker or the Licensed Penetration Tester Master from the EC-Council, the Certified Expert Penetration Tester from the Information Assurance Certification Review Board, and the CompTIA Security+ credential.‎

    • Any organization within any industry can benefit from pen testing, but some of the industries most likely to hire pen testers include those that are highly regulated, like health care, banking and finance companies, and service providers. Pen testers can use their skills to test for compliance with regulations. For example, pen testers might perform an audit of a medical device company, hospital, or health care information exchange to ensure it's HIPAA-compliant. Other places rely on pen testing to reveal vulnerabilities in their websites, networks, and systems to remain more secure and enact policies to stay that way.‎

    此常见问题解答内容仅供参考。建议学生多做研究,确保所追求的课程和其他证书符合他们的个人、专业和财务目标。
    其他可浏览的主题
    Placeholder
    艺术与人文
    338 课程
    Placeholder
    商务
    1095 课程
    Placeholder
    计算机科学
    668 课程
    Placeholder
    数据科学
    425 课程
    Placeholder
    信息技术
    145 课程
    Placeholder
    健康
    471 课程
    Placeholder
    数学和逻辑
    70 课程
    Placeholder
    个人发展
    137 课程
    Placeholder
    物理科学与工程
    413 课程
    Placeholder
    社会科学
    401 课程
    Placeholder
    语言学习
    150 课程

    Coursera Footer

    开拓职业生涯或促进职业发展

    • Google 数据分析师
    • Google 项目管理
    • Google UX 设计
    • Google IT 支持
    • IBM 数据科学
    • IBM 数据分析师
    • 使用 Excel 和 R 的 IBM 数据分析
    • IBM Cybersecurity Analyst
    • IBM 数据工程
    • IBM 全栈云开发人员
    • Facebook 社交媒体营销
    • Facebook 市场营销分析
    • Salesforce 销售发展代表
    • Salesforce 销售运营
    • 直觉簿记
    • 备考 Google Cloud 认证:云架构师
    • 备考 Google Cloud 认证:云数据工程师
    • 开启您的职业生涯
    • 准备证书
    • 开拓职业生涯

    浏览热门主题

    • 免费课程
    • 学习语言
    • python
    • Java
    • 网页设计
    • SQL
    • Cursos Gratis
    • Microsoft Excel
    • 项目管理
    • 网络安全
    • 人力资源
    • 数据科学免费课程
    • 说英语
    • 内容写作
    • 全栈网络开发
    • 人工智能
    • C 语言程序设计
    • 沟通技能
    • 区块链
    • 查看全部课程

    热门课程和文章

    • 适用于数据科学团队的技能
    • 数据驱动的决策
    • 软件工程技能
    • 工程团队所需的软技能
    • 管理技能
    • 营销技能
    • 销售团队所需的技能
    • 产品经理技能
    • 财务技能
    • 英国的热门数据科学课程
    • Beliebte Technologiekurse in Deutschland
    • 热门网络安全证书
    • 热门 IT 证书
    • 热门 SQL 证书
    • 营销经理职业指南
    • 项目经理职业指南
    • Python 程序设计技能
    • Web 开发者职业指南
    • 数据分析师技能
    • 用户体验设计师方面的技能

    在线获得学位或证书

    • MasterTrack® 证书
    • 专业证书
    • 大学证书
    • MBA 和商学学位
    • Data Science Degrees
    • Computer Science Degrees
    • 数据分析师学位
    • 公共卫生学位
    • 社会科学学位
    • 管理学位
    • 欧洲顶级大学学位
    • 硕士学位
    • 学士学位
    • 具有成绩录取途径的学位
    • 学士学位课程
    • 什么是学士学位?
    • 取得硕士学位需要多长时间?
    • 在线获取 MBA 有什么价值?
    • 报名研究生院的 7 种付费方式
    • 查看所有证书

    Coursera

    • 关于
    • 我们提供的内容
    • 管理团队
    • 工作机会
    • 目录
    • Coursera Plus
    • 专业证书
    • MasterTrack® 证书
    • 学位
    • 企业版
    • 政府版
    • 面向校园
    • 成为合作伙伴
    • 新冠疫情响应

    社区

    • 学生
    • 合作伙伴
    • 开发者
    • Beta 测试人员
    • 专业译员
    • 博客
    • 技术博客
    • 教学中心

    更多

    • 媒体
    • 投资者
    • 条款
    • 隐私
    • 帮助
    • 内容访问
    • 联系我们
    • 文章
    • 目录
    • 附属公司
    随时随地学习
    通过 App Store 下载通过 Google Play 获取
    Placeholder
    © 2022 Coursera Inc.保留所有权利。
    • Placeholder
    • Placeholder
    • Placeholder
    • Placeholder
    • Placeholder