Cybersecurity: Pen-Testing, Threat Hunting, & Encryption
Build in-demand cybersecurity skills in penetration testing, threat hunting, and cryptography. Learn to prevent cyber threats, create reports, and use AI for threat intelligence.

Language
- English
Topic
- Computer Science & Information Technology
Skills You Will Learn
- CyberSecurity, Cyber Threat Intelligence, Crytography, Penetration Test, Cyber Threat Hunting, Encryption
Offered By
- IBMSkillsNetwork
Estimated Effort
- 17 hours
Platform
- SkillsNetwork
Last Update
- June 23, 2025
If you’re ready to gain in-demand cybersecurity expertise in penetration testing, threat hunting, and cryptography, this hands-on course will equip you with the skills needed to advance your career.
Learning Outcomes
- Gain in-demand penetration testing and threat hunting skills, with hands-on practice that employers value on your resume.
- Acquire practical experience applying penetration testing principles using tools like OWASP ZAP and SNYK.
- Learn how to create detailed penetration testing reports and integrate AI for advanced threat hunting and intelligence gathering.
- Master cryptography and cryptanalysis techniques, including encryption and hashing, to ensure data integrity and confidentiality.
Course Syllabus
Video: Course Introduction (4:03)
General Information
Plugin/Reading: Helpful Tips for Course Completion
Grading Scheme
Module 1: Penetration Testing Planning and Discovery
- Module Introduction and Learning Objectives
- Video: What is Penetration Testing? (7:40)
- Video: Penetration Testing Phases (7:12)
- Activity: Phases of the Penetration Testing Challenge
- Video: Penetration Testing - Planning Phase (8:29)
- Video: Penetration Testing - Discovery Phase (5:56)
- Reading: Examples of passive and active reconnaissance
- Reading: Google Dorking
- Hands-on Lab: Practicing Google Dorking Commands
- Practice Quiz: Penetration Testing Planning and Discovery
- Reading: Summary and Highlights: Penetration Testing Planning and Discovery
- Module Glossary: Penetration Testing Planning and Discovery Phases
- Graded Assignment: Graded Quiz: Penetration Testing Planning and Discovery
- Module Introduction and Learning Objectives
- Video: Penetration Testing: Attack Phase (6:02)
- Reading: Penetration Testing Tools
- Hands-on Lab: Penetration Testing
- Video: Port Scanning (6:52)
- Lab: Port Scanning with NMap
- Lab: Scanning Network Environment with NMap
- Video: Overview Of Network Protocol Analyzers (7:05)
- Hands-on Lab: Network Protocol Analyzers
- Practice Quiz: Penetration Testing: Attack Phase
- Summary and Highlights: Penetration Testing: Attack Phase
- Reading: Glossary: Penetration Testing: Attack Phase
- Graded Assignment: Graded Quiz: Penetration Testing: Attack Phase
- Module Introduction and Learning Objectives
- Video: Software and Application Pen Testing (6:50)
- Video: Scanning Code Repositories (5:28)
- Hands-on Lab: Getting started with GitHub (optional)
- Hands-on Lab: Using SNYK to scan your code repository (optional)
- Video: Penetration Testing - Reporting Phase (7:35)
- Reading: PTES Framework
- Activity: PTES Framework
- Practice Quiz: Penetration Testing Reporting
- Reading: Summary and Highlights: Penetration Testing: Reporting Phase
- Plugin/Reading: Glossary: Penetration Testing: Reporting Phase
- Graded Assignment: Graded Quiz: Penetration Testing: Reporting Phase
- Module Introduction and Learning Objectives
- Video: Threat Hunting Overview (5:09)
- Video: Threat Intelligence Overview (5:09)
- Reading: Threat Intelligence Process
- Activity: Implement Threat Intelligence
- Reading: Threat Intelligence Sources
- Lab: Review X-Force Exchange Threat Reports
- Video: Security Information and Event Management (7:13)
- Video: AI in Threat Intelligence and Threat Hunting (5:17)
- Reading: User and Entity Behavior Analytics
- Video: Threat Intelligence Framework Overview (7:15)
- Reading: Use Cases of the MITRE ATT&CK Model and the Diamond Model of Intrusion Analysis
- Practice Quiz: Threat Intelligence Platforms and Frameworks
- Reading: Summary and Highlights: Threat Hunting and Threat Intelligence
- Plugin/Reading: Glossary: Threat Hunting and Threat Intelligence
- Graded Assignment: Graded Quiz: Threat Hunting and Threat Intelligence
- Module Introduction and Learning Objectives
- Video: Importance of Cryptography (6:12)
- Video: Overview of Encryption, Decryption, and Hashing (6:32)
- Video: Symmetric and Asymmetric Encryption (6:16)
- Reading: Essentials of Cryptography and Security
- Lab : End of Encryption/ Decryption (RSA Algorithm)
- Video: Common Cryptographic Attacks (6:32)
- Video: Securing SSL/TLS and Strengthening Key Management Edit Set Access Page Actions (4:20)
- Video: Cryptanalysis and Its Impact on Encryption (6:55)
- Reading: Cryptographic Algorithms, Applications, and Attacks
- Lab : Cryptoanalysis Attack
- Reading: Quantum-Safe Cryptography
- Video: IBM Quantum Safe Cryptography Solutions (3:17)
- Practice Quiz: Cryptographic Attacks
- Reading: Summary and Highlights: Cryptography: Principles and Techniques
- Plugin/Reading: Glossary: Cryptography: Principles and Techniques
- Graded Quiz: Cryptography and Cryptographic Attacks
- Module Introduction and Learning Objectives
- Project Overview
- Final Project: Part 1 - Perform Vulnerability Analysis and Penetration Testing
- Final Project: Part 2 - Secure Information Using Symmetric Encryption
- Peer Graded Assignment
- Course Glossary
- Video: Course Highlights and Key Takeaways (7:25)
- Reading: Congratulations and Next Steps
- Reading: Team and Acknowledgments
- Copyrights and Trademarks
Claim your Badge
General Information
- This course is self-paced.
- This platform works best with current versions of Chrome, Edge, Firefox, Internet Explorer, or Safari.
Recommended Skills Prior to Taking this Course

Language
- English
Topic
- Computer Science & Information Technology
Skills You Will Learn
- CyberSecurity, Cyber Threat Intelligence, Crytography, Penetration Test, Cyber Threat Hunting, Encryption
Offered By
- IBMSkillsNetwork
Estimated Effort
- 17 hours
Platform
- SkillsNetwork
Last Update
- June 23, 2025
Instructors
Rav Ahuja
Global Program Director, IBM Skills Network
Rav Ahuja is a Global Program Director at IBM. He leads growth strategy, curriculum creation, and partner programs for the IBM Skills Network. Rav co-founded Cognitive Class, an IBM led initiative to democratize skills for in demand technologies. He is based out of the IBM Canada Lab in Toronto and specializes in instructional solutions for AI, Data, Software Engineering and Cloud. Rav presents at events worldwide and has authored numerous papers, articles, books and courses on subjects in managing and analyzing data. Rav holds B. Eng. from McGill University and MBA from University of Western Ontario.
Read more