This course offers an in-depth exploration of web security, social engineering, and external attacks. Through a combination of theoretical knowledge and hands-on practice, learners will gain the skills necessary to secure web applications, conduct ethical hacking, and understand the techniques used by attackers to exploit system vulnerabilities. By mastering tools like msfvenom, Beef, and social engineering tactics, students will develop expertise in identifying and defending against common security threats.



Web Security, Social Engineering & External Attacks
This course is part of The Complete Ethical Hacking Course Specialization

Instructor: Packt - Course Instructors
Included with
Recommended experience
What you'll learn
Execute advanced web-based attacks using tools like Beef and msfvenom
Understand and defend against social engineering techniques like phishing and malware
Perform effective penetration testing and vulnerability assessments on web applications
Safeguard against cross-site scripting (XSS) and other common web application vulnerabilities
Skills you'll gain
Details to know

Add to your LinkedIn profile
May 2025
12 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate


Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review

There are 11 modules in this course
In this module, we will focus on user-targeted attacks, showing you how ethical hackers exploit vulnerabilities in users’ systems. You'll explore powerful tools like msfvenom and FatRat for creating backdoors and maintaining stealthy, long-term access to compromised systems.
What's included
9 videos2 readings1 assignment
In this module, we will dive into social engineering attacks and how they exploit human behavior. We’ll cover tools and strategies used by ethical hackers to manipulate targets, and discuss methods for preventing these attacks, including phishing and malware detection.
What's included
12 videos1 assignment
In this module, we will emphasize the importance of securing social media accounts from cyber threats. We will explore phishing tactics on platforms like Instagram and provide strategies for defending against these attacks and securing your personal and corporate profiles.
What's included
5 videos1 assignment
In this module, we will introduce Beef, an essential tool for ethical hackers. We’ll guide you through its functionalities, demonstrating how to use it for web-based attacks like hooking targets and stealing passwords, and offer strategies for defending against these attacks.
What's included
10 videos1 assignment
In this module, we will focus on external network attacks and the methods used by ethical hackers to exploit remote systems. You will explore tunneling services, backdoors, and various penetration testing tools, equipping you to conduct effective network penetration tests.
What's included
12 videos1 assignment
In this module, we will explore the use of fake game websites for social engineering and web-based attacks. You’ll learn how to create these sites, integrate them with tools like Beef, and protect yourself from falling victim to these types of attacks.
What's included
11 videos1 assignment
In this module, we will focus on the critical post-hacking steps necessary for managing access and gathering data from compromised systems. You will learn about Meterpreter sessions, keyloggers, and maintaining stealth for long-term control of compromised systems.
What's included
7 videos1 assignment
In this module, we will introduce the hacker methodology, a step-by-step approach used in ethical hacking. You will learn how to conduct thorough assessments and understand the ethical framework that guides responsible penetration testing.
What's included
4 videos1 assignment
In this module, we will cover website reconnaissance techniques, focusing on gathering critical information through tools like Maltego and Netcraft. You will explore DNS, Whois, and subdomain analysis to identify vulnerabilities in web applications.
What's included
9 videos1 assignment
In this module, we will focus on website penetration testing, guiding you through techniques like exploiting code execution vulnerabilities and uploading malicious files. You will also learn how to execute reverse TCP commands and file inclusion attacks to compromise web servers.
What's included
6 videos1 assignment
In this module, we will explore Cross Site Scripting (XSS) attacks and demonstrate how they can be exploited in real-world scenarios. You will also learn best practices for preventing XSS vulnerabilities and protecting web applications from this common attack.
What's included
7 videos1 reading2 assignments
Instructor

Offered by
Explore more from Computer Security and Networks
Why people choose Coursera for their career




New to Computer Security and Networks? Start here.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
More questions
Financial aid available,