When you enroll in this course, you'll also be asked to select a specific program.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 6 modules in this course
The cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture.
During the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into threat intelligence. Plus, you’ll learn to leverage Cyber Threat Intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods.
To complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity.
This course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course.
If you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume.
This module provides an overview of the different phases of penetration testing, which includes planning, discovery, attack, verification, and reporting. You'll also learn about the fundamental concepts of penetration testing and its importance. The module will focus on the planning and discovery phases. The planning phase will cover the rules of engagement, which ensure penetration tests are conducted ethically and legally. Then, in the discovery phase, you will be introduced to passive and active reconnaissance methods and Google Dorking.
What's included
5 videos2 readings3 assignments7 plugins
Show info about module content
5 videos•Total 33 minutes
Course Introduction •4 minutes
What is Penetration Testing?•8 minutes
Penetration Testing Phases •7 minutes
Penetration Testing: Planning Phase •8 minutes
Penetration Testing: Discovery Phase•6 minutes
2 readings•Total 8 minutes
Course Overview •5 minutes
Summary and Highlights: Penetration Testing: Planning and Discovery Phases•3 minutes
3 assignments•Total 50 minutes
Graded Quiz: Penetration Testing: Planning and Discovery Phases•30 minutes
Practice Quiz: Penetration Testing Planning•10 minutes
Practice Quiz: Penetration Testing Discovery•10 minutes
7 plugins•Total 63 minutes
Helpful Tips for Course Completion•3 minutes
Uncovering Penetration Testing Myths•5 minutes
Activity: Phases of the Penetration Testing Challenge•15 minutes
Reading: Examples of Passive and Active Reconnaissance •5 minutes
Reading: Google Dorking •5 minutes
Lab: Practicing Google Dorking Commands•20 minutes
Module Glossary: Penetration Testing: Planning and Discovery Phases•10 minutes
Penetration Testing: Attack Phase
Module 2•4 hours to complete
Module details
This module focuses on the attack phase of penetration testing. You will learn about the key actions involved in the attack phase, including running exploits, bypassing defenses, gaining elevated privileges, and initiating post-attack activities. You will also explore various penetration testing tools and perform port and website scans using online penetration tools. Further, you will solidify your understanding of port scanning, network scanning, and network protocol analyzers through hands-on labs.
This module focuses on the reporting phase of penetration testing, while introducing the concepts of software and application pen testing. You will learn how to scan code repositories for vulnerabilities and understand its benefits. You will also understand the importance of the reporting phase, create comprehensive penetration testing reports, and implement the Penetration Testing Execution Standard (PTES) framework, which provides insights into industry standards for reporting.
What's included
3 videos1 reading3 assignments5 plugins
Show info about module content
3 videos•Total 20 minutes
Software and Application Pen Testing•7 minutes
Scanning Code Repositories •5 minutes
Penetration Testing: Reporting Phase•8 minutes
1 reading•Total 5 minutes
Summary and Highlights: Penetration Testing: Reporting Phase •5 minutes
This module provides an overview of threat hunting practices and the role of threat intelligence in cybersecurity. You will explore various threat intelligence sources and learn how to review recent security threat reports using IBM X-Force Threat Exchange. You'll also learn about threat intelligence platforms, security information and event management (SIEM) systems, threat intelligence frameworks, and threat hunting models. Additionally, you'll gain insights into the role of AI in enhancing threat intelligence and hunting capabilities.
What's included
5 videos1 reading3 assignments7 plugins
Show info about module content
5 videos•Total 33 minutes
Threat Hunting Overview •8 minutes
Threat Intelligence Overview •5 minutes
Security Information and Event Management•7 minutes
AI in Threat Intelligence and Threat Hunting•5 minutes
Threat Intelligence Framework Overview •7 minutes
1 reading•Total 4 minutes
Summary and Highlights: Threat Hunting and Threat Intelligence •4 minutes
3 assignments•Total 50 minutes
Graded Quiz: Threat Hunting and Threat Intelligence •30 minutes
Practice Quiz: Threat Hunting and Intelligence •10 minutes
Practice Quiz: Threat Intelligence Platforms and Frameworks •10 minutes
Reading: User and Entity Behavior Analytics•5 minutes
Reading: Use Cases of the MITRE ATT&CK Model and the Diamond Model of Intrusion Analysis•5 minutes
Glossary: Threat Hunting and Threat Intelligence •10 minutes
Cryptography: Principles and Techniques
Module 5•3 hours to complete
Module details
This module delves into the fundamental concepts and practices of cryptography, covering essential techniques for ensuring data integrity, confidentiality, and authenticity. You will gain insights into symmetric and asymmetric encryption algorithms like AES and RSA, as well as hashing techniques. The module also examines key management practices and crucial cryptographic techniques, such as securing SSL/TLS. Further, it addresses common cryptographic attacks and cryptanalysis techniques, providing a comprehensive understanding of cryptographic solutions for enhancing organizational security.
Overview of Encryption, Decryption, and Hashing•7 minutes
Symmetric and Asymmetric Encryption•6 minutes
Common Cryptographic Attacks•7 minutes
Securing SSL/TLS and Strengthening Key Management•4 minutes
Cryptanalysis and Its Impact on Encryption•7 minutes
IBM Quantum Safe Cryptography Solutions•3 minutes
1 reading•Total 3 minutes
Summary and Highlights: Cryptography: Principles and Techniques•3 minutes
3 assignments•Total 50 minutes
Graded Quiz: Cryptography: Principles and Techniques•30 minutes
Practice Quiz: Introduction to Cryptography •10 minutes
Practice Quiz: Cryptographic Attacks•10 minutes
2 app items•Total 60 minutes
Lab: Symmetric Encryption Using AES•30 minutes
Lab: Asymmetric Encryption Using RSA•30 minutes
7 plugins•Total 57 minutes
Evolution of Cryptography •15 minutes
Reading: Essentials of Cryptography and Security •5 minutes
(Optional) Lab: End of Encryption/Decryption (RSA Algorithm)•5 minutes
Reading: Cryptographic Algorithms, Applications, and Attacks •10 minutes
(Optional) Lab: Cryptanalysis Attack•5 minutes
Reading: Quantum-Safe Cryptography•7 minutes
Glossary: Cryptography: Principles and Techniques•10 minutes
Final Project and Wrap-Up
Module 6•3 hours to complete
Module details
In this module, you will apply the knowledge gained in the course in a final project. The module also wraps up the course learning and highlights key takeaways and next steps.
At IBM, we know how rapidly tech evolves and recognize the crucial need for businesses and professionals to build job-ready, hands-on skills quickly. As a market-leading tech innovator, we’re committed to helping you thrive in this dynamic landscape. Through IBM Skills Network, our expertly designed training programs in AI, software development, cybersecurity, data science, business management, and more, provide the essential skills you need to secure your first job, advance your career, or drive business success. Whether you’re upskilling yourself or your team, our courses, Specializations, and Professional Certificates build the technical expertise that ensures you, and your organization, excel in a competitive world.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.6
2,532 reviews
5 stars
74.10%
4 stars
18.43%
3 stars
4.26%
2 stars
1.57%
1 star
1.61%
Showing 3 of 2532
M
MM
5·
Reviewed on May 6, 2025
Professional insights and valuable course to be honest, I developed my skills and my passion grows now due to this outstanding course and the lab was enjoyable as well. Thanks from bottom of my heart.
J
JL
4·
Reviewed on Oct 18, 2022
Muy bien estructurado, es un paso general por los conceptos de las pruebas de penetracion y respuesta a incidentes. Se hace necesario estudiar por cuenta propia si se quiere profundizar en alguno.
M
MC
5·
Reviewed on Jun 10, 2024
I've learned more than in the Internet videos, the explanation and examples helps to practice and understand how to think, scratch and create a script in Python.
What is penetration testing and why is it important?
Penetration testing, or pen testing, is the process of simulating cyberattacks to identify vulnerabilities in an organization's security systems. It helps businesses strengthen their cybersecurity defenses by revealing weaknesses before malicious hackers can exploit them. Regular pen testing is crucial for maintaining data security and meeting compliance standards.
How does threat hunting differ from penetration testing?
Threat hunting is a proactive cybersecurity strategy where experts search for potential threats within an organization's network, even if no alarm has been triggered. Unlike penetration testing, which focuses on identifying vulnerabilities through simulated attacks, threat hunting seeks out hidden or advanced threats that may bypass traditional security measures.
How do penetration testing and threat hunting improve cybersecurity?
Penetration testing helps organizations strengthen their cybersecurity by identifying and addressing vulnerabilities before they can be exploited by attackers. Threat hunting, on the other hand, proactively seeks out hidden or advanced threats that evade traditional security measures. Together, these practices enhance an organization's ability to detect, prevent, and respond to cyberattacks, ensuring a more robust and resilient security posture.
What is the role of cryptography in cybersecurity?
Cryptography plays a key role in protecting sensitive information and converting it into formats that are unreadable or inaccessible to unauthorized users. It enhances the confidentiality, integrity, and authenticity of digital communications. Cryptography also helps secure transactions, personal data, and private communications from cyberattacks. It is widely used in applications such as secure online banking, encrypted messaging apps, digital signatures, and virtual private networks (VPNs).
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.