Penetration Testing, Threat Hunting, and Cryptography
Completed by Faiza Anum
January 22, 2026
17 hours (approximately)
Faiza Anum's account is verified. Coursera certifies their successful completion of Penetration Testing, Threat Hunting, and Cryptography
What you will learn
In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.
Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.
How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.
Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.
Skills you will gain
- Category: Penetration Testing
- Category: AI Integrations
- Category: Encryption
- Category: Cybersecurity
- Category: Cyber Threat Hunting
- Category: Vulnerability Assessments
- Category: Cryptography
- Category: Exploitation techniques
- Category: Test Planning
- Category: Application Security
- Category: Vulnerability Scanning
- Category: Brute-force attacks

