Penetration Testing, Threat Hunting, and Cryptography
Learn on
IntermediateCourse
This course provides practical training in penetration testing, including phases like software pen testing, code scanning, and report creation, as well as threat hunting and AI-driven threat intelligence. You’ll also learn to use Cyber Threat Intelligence (CTI) frameworks and explore cryptographic techniques and attacks.
4.6 (2k+ Reviews)

Language
- English
Topic
- Security
Industries
- Information Technology
Enrollment Count
- 113.04K
Skills You Will Learn
- Cryptography, CyberSecurity, Cyner Threat Hunting, Penetration Test, Security
Offered By
- IBMSkillsNetwork
Estimated Effort
- 6 weeks
Platform
- Coursera
Last Update
- March 17, 2026
About this Course
The cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture.
During the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into threat intelligence. Plus, you’ll learn to leverage Cyber Threat Intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods.
To complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity.
This course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course.
If you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume.
During the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into threat intelligence. Plus, you’ll learn to leverage Cyber Threat Intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods.
To complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity.
This course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course.
If you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume.
Course Syllabus
Module 1: Penetration Testing: Planning and Discovery Phases
Module 2: Penetration Testing: Attack Phase
Module 3: Penetration Testing: Reporting Phase
Module 4: Threat Hunting and Threat Intelligence
Module 5: Cryptography: Techniques and Principles
Module 6: Final Project, Course Wrap-Up, and Final Quiz
Module 5: Cryptography: Techniques and Principles
Module 6: Final Project, Course Wrap-Up, and Final Quiz
Recommended Skills Prior to Taking this Course
This course requires basic knowledge of networking fundamentals and cybersecurity. You will need a laptop or desktop computer to get the most out of this course.
This course is recommended for learners who have completed any of the following courses:
- Introduction to Cybersecurity Essentials
- Introduction to Cybersecurity Tools & Cyberattacks
- Operating Systems: Overview, Administration, and Security
- Computer Networks and Network Security
- Cyber Threat Intelligence
Course objectives
- Explain the different phases of penetration testing, including planning, discovery, attack, and reporting.
- Understand and apply penetration testing principles using various tools and techniques.
- Create comprehensive penetration testing reports and perform advanced threat hunting.
- Explore threat intelligence platforms and cryptography techniques to enhance organizational cybersecurity functions.

Language
- English
Topic
- Security
Industries
- Information Technology
Enrollment Count
- 113.04K
Skills You Will Learn
- Cryptography, CyberSecurity, Cyner Threat Hunting, Penetration Test, Security
Offered By
- IBMSkillsNetwork
Estimated Effort
- 6 weeks
Platform
- Coursera
Last Update
- March 17, 2026