Total Seminars

Application, Cloud, and Specialized Attacks

Total Seminars

Application, Cloud, and Specialized Attacks

Michael Solomon

Instructor: Michael Solomon

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Advanced level

Recommended experience

4 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Advanced level

Recommended experience

4 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • How to identify and exploit web application and database vulnerabilities including SQL injection, XSS, and privilege escalation techniques

  • How to assess cloud infrastructure security and exploit misconfigurations in AWS, Azure, and other cloud platforms during an authorized engagement

  • How to conduct social engineering simulations, and perform assessments on specialized systems including IoT devices and industrial control systems

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

May 2026

Assessments

5 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the CompTIA PenTest+ Specialization Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 5 modules in this course

This chapter covers common web, application, API, and host‑based vulnerabilities and shows how pentesters exploit them to gain access, escalate privileges, and move laterally through systems.

What's included

15 videos4 readings1 assignment

This chapter examines common cloud‑specific attacks by showing how pentesters identify and exploit misconfigurations, credentials, and cloud services to escalate privileges, disrupt availability, and compromise cloud environments.

What's included

2 videos1 reading1 assignment

This chapter covers mobile, IoT, data storage, virtualization, and industrial system vulnerabilities, showing how pentesters identify and exploit weaknesses across modern and embedded computing environments.

What's included

3 videos2 readings1 assignment

This chapter examines social engineering and physical security attacks by showing how pentesters plan effective pretexts and exploit human behavior and physical access controls to gain unauthorized access to systems and data.

What's included

5 videos1 reading1 assignment

Final graded assessment

What's included

1 assignment

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Michael Solomon
Total Seminars
0 Courses0 learners

Offered by

Total Seminars

Explore more from Computer Security and Networks

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions