This course provides an advanced exploration of exploit development, malware creation, and defensive strategies in ethical hacking. By delving into object-oriented programming, building backdoors, creating malicious payloads, and analyzing network traffic, learners will gain hands-on experience in crafting cybersecurity tools and deploying them for real-world testing. The course also highlights defensive tactics, equipping learners with the skills necessary to protect systems from the very exploits they learn to develop.



Exploit Development, Malware, & Defensive Strategies
This course is part of The Complete Ethical Hacking Course Specialization

Instructor: Packt - Course Instructors
Included with
Recommended experience
What you'll learn
Develop advanced Python scripts using Object-Oriented Programming for ethical hacking tasks
Create backdoors, keyloggers, and network exploits for penetration testing
Package and disguise malicious files to bypass security systems and execute attacks
Implement defensive strategies against MITM attacks, packet listeners, and other network exploits
Skills you'll gain
Details to know

Add to your LinkedIn profile
May 2025
10 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate


Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review

There are 10 modules in this course
In this module, we will introduce Object-Oriented Programming (OOP) concepts, including classes, methods, and inheritance in Python. You'll learn how to apply these principles to build efficient and reusable hacking tools while also mastering error handling techniques.
What's included
8 videos2 readings1 assignment
In this module, we will explore the world of Python modules, focusing on how to write, use, and manage them to streamline your ethical hacking scripts. You'll also learn the benefits of using external libraries and the key differences between running scripts directly and importing them.
What's included
5 videos1 assignment
In this module, we will cover the essentials of MAC address manipulation, including how to change MAC addresses for anonymity. You’ll gain hands-on experience with Python, using subprocess and regex techniques to automate the process and enhance your security practices.
What's included
13 videos1 assignment
In this module, we will introduce network scanning techniques, focusing on ARP and broadcast requests to identify devices on a network. You'll also enhance your scanning scripts with new features and ensure they are compatible with Python 3 for more effective cybersecurity assessments.
What's included
9 videos1 assignment
In this module, we will delve into the tactics behind MITM attacks, demonstrating how to intercept network traffic using ARP poisoning. You will learn how to script these attacks effectively, incorporating error handling and user input for more sophisticated MITM scenarios.
What's included
10 videos1 assignment
In this module, we will dive into packet listening and analysis using Wireshark and Python. You’ll also learn techniques for securing your network traffic against potential listeners while mastering the intricacies of network packet analysis.
What's included
8 videos1 assignment
In this module, we will cover the creation of a keylogger using Python, focusing on capturing and logging keystrokes. You’ll also learn how to save, send, and optimize keyloggers, with an emphasis on ethical considerations and proper testing.
What's included
10 videos1 assignment
In this module, we will explore backdoor creation, from writing the backdoor script to developing a listener for remote access. You’ll learn how to interact with target systems, retrieve data, and upload files, with an emphasis on error handling and Python 3 compatibility.
What's included
19 videos1 assignment
In this module, we will explore how to package and disguise malicious files for deployment, focusing on techniques like changing icons and file extensions. You’ll also learn how to create executable payloads and configure them for persistence in compromised systems.
What's included
10 videos1 assignment
In this final module, we will close the course with parting thoughts on the importance of ethical hacking practices. You will be guided towards responsible cybersecurity endeavors and provided with key resources to continue your learning journey.
What's included
1 video1 reading1 assignment
Instructor

Offered by
Explore more from Computer Security and Networks
Why people choose Coursera for their career




New to Computer Security and Networks? Start here.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
More questions
Financial aid available,