IBM
IBM Ethical Hacking with Open Source Tools Professional Certificate

Enjoy unlimited growth with a year of Coursera Plus for $199 (regularly $399). Save now.

IBM

IBM Ethical Hacking with Open Source Tools Professional Certificate

Master key ethical hacking tools in just 2 months. Explore Kali Linux, Wireshark, Metasploit & OpenVAS for pen testing & vulnerability assessment.

IBM Skills Network Team
Dee Dee Collette
Christo Oehley

Instructors: IBM Skills Network Team +3 more

11,084 already enrolled

Included with Coursera Plus

Earn a career credential that demonstrates your expertise
4.7

(143 reviews)

Intermediate level

Recommended experience

2 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Earn a career credential that demonstrates your expertise
4.7

(143 reviews)

Intermediate level

Recommended experience

2 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Analyze the roles and responsibilities of ethical hackers, including the distinctions between black hat, white hat, and gray hat hackers

  • Execute simulated attacks using the Metasploit framework to exploit vulnerabilities, maintain access, and develop mitigation strategies 

  • Utilize Kali Linux tools to perform information gathering, vulnerability analysis, & exploitation in controlled environments for penetration testing

  • Apply responsible disclosure processes to ethically document and report security vulnerabilities in accordance with legal & organizational standards

Skills you'll gain

  • Category: Threat Management
  • Category: Anomaly Detection
  • Category: Cyber Security Policies
  • Category: Exploit development
  • Category: Bash (Scripting Language)
  • Category: Information Systems Security
  • Category: Network Analysis
  • Category: Cyber Security Assessment
  • Category: Threat Detection
  • Category: Vulnerability Management
  • Category: Network Security
  • Category: Network Monitoring
  • Category: Network Troubleshooting
  • Category: Cybersecurity
  • Category: Incident Response
  • Category: Vulnerability Scanning
  • Category: Penetration Testing
  • Category: Vulnerability Assessments
  • Category: Intrusion Detection and Prevention
  • Category: Cyber Threat Intelligence

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English

Advance your career with in-demand skills

  • Receive professional-level training from IBM
  • Demonstrate your technical proficiency
  • Earn an employer-recognized certificate from IBM

Professional Certificate - 6 course series

What you'll learn

  • Analyze the fundamental concepts and roles of ethical hacking in cybersecurity, including the distinctions between hacker types

  • Evaluate major global cybersecurity laws and legal boundaries to determine compliance considerations for ethical hacking and penetration testing

  • Identify common legal pitfalls and compliance requirements relevant to penetration testers in various jurisdictions

  • Apply responsible disclosure processes and effectively document and report security findings in accordance with ethical and legal standards

Skills you'll gain

Category: General Data Protection Regulation (GDPR)
Category: Cyber Governance
Category: Information Systems Security
Category: Data Ethics
Category: Cyber Risk
Category: Cyber Security Policies
Category: Computer Security
Category: Application Security
Category: Responsible AI

What you'll learn

  • Job-ready skills to effectively use Kali Linux security and penetration testing tools for ethical hacking in just 5 weeks

  • Perform penetration tests using Kali Linux, applying various tools and techniques to assess vulnerabilities in controlled environments

  • Configure virtual machines and customize Kali Linux security tools to create safe, efficient, and adaptable testing environments

  • Automate maintenance, security, and penetration tasks using command-line tools and scripting to optimize system performance and security

Skills you'll gain

Category: Bash (Scripting Language)
Category: Virtualization
Category: Network Monitoring
Category: Exploit development
Category: System Configuration
Category: Digital Forensics

What you'll learn

  • Build job-ready skills using the Metasploit framework, its architecture, and capabilities, to effectively support penetration testing activities.

  • Perform reconnaissance, vulnerability assessment, exploit execution, and post-exploitation tasks using Metasploit.

  • Develop, modify, and execute exploits for real-world attack scenarios, including network, web application, and social engineering.

  • Document penetration testing findings, generate actionable reports, and provide recommendations for security improvements.

Skills you'll gain

Category: Penetration Testing
Category: Exploit development
Category: Network Security
Category: Vulnerability Assessments
Category: Vulnerability
Category: Cybersecurity
Category: Virtual Machines
Category: Information Systems Security
Category: Data Persistence

What you'll learn

  • Describe the principles, objectives, tools, and challenges of network forensics and traffic analysis.

  • Apply packet capture and filtering techniques using tools like Wireshark.

  • Analyze network protocols and traffic using Deep Packet Inspection (DPI) and flow data to identify potential security threats.

  • Create detailed reports from captured data tailored for stakeholders and incident response teams.

Skills you'll gain

Category: Network Analysis
Category: Threat Detection
Category: Anomaly Detection
Category: Network Security
Category: Network Protocols
Category: Network Monitoring
Category: Distributed Denial-Of-Service (DDoS) Attacks
Category: Vulnerability Assessments
Category: Digital Forensics
Category: Cyber Security Assessment
Category: Network Troubleshooting
Category: Cybersecurity
Category: Incident Response
Category: Technical Communication
Category: Intrusion Detection and Prevention
Category: Computer Security

What you'll learn

  • Build job-ready skills installing OpenVAS on Linux, setting scan targets, and running basic vulnerability scans in a virtual lab

  • Interpret OpenVAS scan reports, apply CVSS scores, and prioritize risks for effective remediation planning aligned with ethical hacking principles

  • Detect threats using indicators of compromise, logs, and apply containment strategies using tools and response techniques

  • Create post-incident reports, integrate threat intelligence, and simulate a whole incident response scenario

Skills you'll gain

Category: Incident Response
Category: Vulnerability Scanning
Category: Vulnerability Assessments
Category: Cyber Threat Intelligence
Category: Threat Detection
Category: Technical Writing
Category: Emergency Response
Category: Cyber Security Assessment
Category: Cybersecurity
Category: Security Strategy
Category: Threat Management
Category: Network Analysis
Category: Risk Mitigation

What you'll learn

  • Demonstrate your hands-on ethical hacking expertise uncovering, remediating system vulnerabilities and leveraging AI to enhance cybersecurity skills

  • Gain practical experience in reconnaissance and exploitation using advanced penetration testing tools like Metasploit

  • Apply privilege escalation and persistence techniques to simulate real-world attacker strategies in security assessments

  • Strengthen defensive skills by detecting threats with OpenVAS, analyzing system logs, and documenting incidents with the MITRE ATT&CK framework

Skills you'll gain

Category: Risk Analysis
Category: Vulnerability Management
Category: Cybersecurity
Category: Cyber Threat Intelligence
Category: Vulnerability Assessments
Category: Data Persistence

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructors

IBM Skills Network Team
IBM Skills Network Team
86 Courses1,699,573 learners
Dee Dee Collette
Dee Dee Collette
IBM
11 Courses659,014 learners
Christo Oehley
Christo Oehley
SkillUp
4 Courses11,599 learners

Offered by

IBM
SkillUp

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Frequently asked questions

¹Based on Coursera learner outcome survey responses, United States, 2021.