Back to Catalog

Penetration Testing, Threat Hunting, and Cryptography

Learn on

Coursera logo
IntermediateCourse

This course provides practical training in penetration testing, including phases like software pen testing, code scanning, and report creation, as well as threat hunting and AI-driven threat intelligence. You’ll also learn to use Cyber Threat Intelligence (CTI) frameworks and explore cryptographic techniques and attacks.

4.6 (2k+ Reviews)

Language

  • English

Topic

  • Security

Industries

  • Information Technology

Enrollment Count

  • 99.84K

Skills You Will Learn

  • CyberSecurity, Penetration Test, Cryptography, Cyner Threat Hunting, Security

Offered By

  • IBMSkillsNetwork

Estimated Effort

  • 6 weeks

Platform

  • Coursera

Last Update

  • April 27, 2025
About this Course
The cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture.

During the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into threat intelligence. Plus, you’ll learn to leverage Cyber Threat Intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods.
 
To complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity.
 
This course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course.
 
If you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume.

Course Syllabus

Module 1: Penetration Testing: Planning and Discovery Phases
Module 2: Penetration Testing: Attack Phase 
Module 3: Penetration Testing: Reporting Phase 
Module 4: Threat Hunting and Threat Intelligence
Module 5: Cryptography: Techniques and Principles
Module 6: Final Project, Course Wrap-Up, and Final Quiz

Recommended Skills Prior to Taking this Course

This course requires basic knowledge of networking fundamentals and cybersecurity. You will need a laptop or desktop computer to get the most out of this course.
This course is recommended for learners who have completed any of the following courses:
  1. Introduction to Cybersecurity Essentials

  2. Introduction to Cybersecurity Tools & Cyberattacks

  3. Operating Systems: Overview, Administration, and Security

  4. Computer Networks and Network Security

  5. Cyber Threat Intelligence

Course objectives

  • Explain the different phases of penetration testing, including planning, discovery, attack, and reporting. 
  • Understand and apply penetration testing principles using various tools and techniques. 
  • Create comprehensive penetration testing reports and perform advanced threat hunting. 
  • Explore threat intelligence platforms and cryptography techniques to enhance organizational cybersecurity functions.

Instructors

Dr. Manish Kumar

SME

Dr. Manish Kumar holds a Ph.D. in Computer Science from Bangalore University, Bangalore, INDIA. With 16 years of teaching experience, he is an Associate Professor at the School of Computer Science and Engineering at RV University, Bangalore. Specializing in information security and digital forensics, he has published many research papers in reputed conferences and journals. Actively involved in research and consultancy, he regularly delivers workshops, technical talks, and training for engineering institutions, researchers, law enforcement, and the judiciary. He is a life member of the Computer Society of India (CSI), Indian Society for Technical Education (ISTE), Indian Science Congress Association (ISCA), and a senior member of The Association for Computing Machinery (ACM).

Read more