This specialization is intended for computer scientists and engineers wishing to expand their technical expertise to the realm of Computing Security, with a broad skill-set and understanding of offensive Cybersecurity. Regardless of what area of Computing you may want to specialize in – from networking and systems to algorithms in machine learning and AI – a deep understanding of how the underlying technologies work, and how they can be abused, is essential to a robustly functioning, secure computing environment. One thing we have learned from the remarkable history of Computing is that staying ahead of attackers requires adopting the adversarial mindset. We aim to develop this mindset through a series of three courses, each exploring a different realm of technology. Throughout the series, expect an in-depth technical treatment with little reliance on pre-made tooling, as we seek to create exploits from scratch. By completing the specialization, you will have gained exposure to modern attacks on computer networks, web applications, binary programs, and cutting-edge areas of research in subverting AI systems.

Discover new skills with $120 off courses from industry experts. Save now.


Security and Ethical Hacking Specialization
Enhance Your Computing Skills with Offsec. Explore offensive computing security from the ground up, expanding your career in computing.

Instructor: Ahmed M. Hamza
Included with
Recommended experience
Recommended experience
What you'll learn
Analyze and exploit weaknesses in system security (lateral movement, privilege escalation) bypassing mitigations and basic defenses.
Identify weaknesses in binary programs, web applications and agentic AI systems. You will also explore adversarial machine learning attacks.
Develop an adversarial mindset through exposure to a wide variety of offensive security topics in several areas of computing.
Overview
Skills you'll gain
- Network Monitoring
- Vulnerability Assessments
- Cybersecurity
- Cyber Security Assessment
- Network Security
- Penetration Testing
- Generative AI Agents
- Virtual Private Networks (VPN)
- Computer Security
- Security Awareness
- Machine Learning Algorithms
- Application Security
- Server Side
- Artificial Intelligence and Machine Learning (AI/ML)
- Network Protocols
- Cryptography
- Cryptographic Protocols
Tools you'll learn
What’s included

Add to your LinkedIn profile
August 2025
Advance your subject-matter expertise
- Learn in-demand skills from university and industry experts
- Master a subject or tool with hands-on projects
- Develop a deep understanding of key concepts
- Earn a career certificate from University of Colorado Boulder

Specialization - 3 course series
What you'll learn
Advanced evasive Techniques on hardened computer systems and networks.
Network recon and man-in-the-middle attacks to compromise credentials
Network attacks on HTTPS and firewalled systems
Skills you'll gain
What you'll learn
Conduct basic and advanced attacks on Unix systems.
Leverage programming and scripting for privilege escalation and lateral movement in computer networks.
Discover, debug and exploit binary vulnerabilities on modern operating systems.
Advanced Offensive Techniques on hardened computer systems and networks.
Skills you'll gain
What you'll learn
Perform and prevent web application attacks and knowledge of defensive techniques.
Understand AI/ML platform and model attacks as an extension of web attacks.
Describe the range of attacks on artificial intelligence algorithms and systems (adversarial machine learning).
Skills you'll gain
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career





Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Basic programming and computer organization. Knowledge of Python is assumed. C and ASM basics recommended (ASM is briefly covered).
It is recommended that learners take the courses in this Specialization in sequential order.
Security and Ethical Hacking is part of CU Boulder's Master of Science in Computer Science (MS-CS). Learners enrolled in the degree program will earn three credits for successful completion of the specialization.
More questions
Financial aid available,