Professional insights and valuable course to be honest, I developed my skills and my passion grows now due to this outstanding course and the lab was enjoyable as well. Thanks from bottom of my heart.



Penetration Testing, Threat Hunting, and Cryptography
This course is part of multiple programs.



Instructors: Dr. Manish Kumar
107,187 already enrolled
Included with
(2,488 reviews)
Recommended experience
What you'll learn
In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.
Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.
How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.
Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.
Skills you'll gain
- Exploitation techniques
- Security Testing
- Cryptography
- Cyber Threat Hunting
- Vulnerability Scanning
- Penetration Testing
- MITRE ATT&CK Framework
- Encryption
- Threat Modeling
- Cybersecurity
- Cyber Threat Intelligence
- Vulnerability Assessments
- Test Planning
- Open Web Application Security Project (OWASP)
- Application Security
- Threat Detection
Details to know

Add to your LinkedIn profile
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

Explore more from Security
- Status: Free Trial
- Status: Free Trial
- Status: Free Trial
- Status: Free Trial
Why people choose Coursera for their career




Learner reviews
2,488 reviews
- 5 stars
73.92%
- 4 stars
18.68%
- 3 stars
4.29%
- 2 stars
1.56%
- 1 star
1.52%
Showing 3 of 2488
Reviewed on May 6, 2025
Reviewed on Oct 18, 2022
Muy bien estructurado, es un paso general por los conceptos de las pruebas de penetracion y respuesta a incidentes. Se hace necesario estudiar por cuenta propia si se quiere profundizar en alguno.
Reviewed on Jun 24, 2023
The heaviest course especially forensics, it needs lot of reading and practice.Thanks to instructors did their best to make somehow easier on beginners.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Penetration testing, or pen testing, is the process of simulating cyberattacks to identify vulnerabilities in an organization's security systems. It helps businesses strengthen their cybersecurity defenses by revealing weaknesses before malicious hackers can exploit them. Regular pen testing is crucial for maintaining data security and meeting compliance standards.
Threat hunting is a proactive cybersecurity strategy where experts search for potential threats within an organization's network, even if no alarm has been triggered. Unlike penetration testing, which focuses on identifying vulnerabilities through simulated attacks, threat hunting seeks out hidden or advanced threats that may bypass traditional security measures.
Penetration testing helps organizations strengthen their cybersecurity by identifying and addressing vulnerabilities before they can be exploited by attackers. Threat hunting, on the other hand, proactively seeks out hidden or advanced threats that evade traditional security measures. Together, these practices enhance an organization's ability to detect, prevent, and respond to cyberattacks, ensuring a more robust and resilient security posture.
More questions
Financial aid available,