Back to Catalog

Cybersecurity: Pen-Testing, Threat Hunting, & Encryption

Premium
IntermediateCourse

Build in-demand cybersecurity skills in penetration testing, threat hunting, and cryptography. Learn to prevent cyber threats, create reports, and use AI for threat intelligence.

Language

  • English

Topic

  • Computer Science & Information Technology

Skills You Will Learn

  • CyberSecurity, Cyber Threat Intelligence, Crytography, Penetration Test, Cyber Threat Hunting, Encryption

Offered By

  • IBMSkillsNetwork

Estimated Effort

  • 17 hours

Platform

  • SkillsNetwork

Last Update

  • June 23, 2025
About this Course
The cost of security breaches continues to rise, prompting businesses to seek skilled professionals who can anticipate and prevent cyber threats. This IBM course in Penetration Testing, Threat Hunting, and Cryptography helps you develop the critical skills needed to identify vulnerabilities, protect assets, and strengthen your organization's cybersecurity defenses using AI and cryptography. 

Throughout the course, you’ll learn the various phases of penetration testing and gain hands-on experience performing software pen testing and scanning code repositories. You’ll also master the creation of detailed penetration testing reports, engage in threat hunting, and integrate AI into threat intelligence processes. In addition, you'll explore Cyber Threat Intelligence (CTI) frameworks to identify and assess potential threats more effectively. 

The course covers essential cryptography techniques, including encryption, decryption, and hashing, while also examining common cryptographic attacks and cryptanalysis methods. By the end, you'll have practical, real-world skills to enhance your organization's security posture. 

To participate in the labs and final project, you will need a laptop or desktop, along with basic knowledge of networking and cybersecurity. This course is ideal for both current cybersecurity professionals looking to sharpen their skills and those aspiring to enter the field.  

If you’re ready to gain in-demand cybersecurity expertise in penetration testing, threat hunting, and cryptography, this hands-on course will equip you with the skills needed to advance your career. 

Learning Outcomes

  • Gain in-demand penetration testing and threat hunting skills, with hands-on practice that employers value on your resume. 
  • Acquire practical experience applying penetration testing principles using tools like OWASP ZAP and SNYK. 
  • Learn how to create detailed penetration testing reports and integrate AI for advanced threat hunting and intelligence gathering. 
  • Master cryptography and cryptanalysis techniques, including encryption and hashing, to ensure data integrity and confidentiality. 

Course Syllabus

Welcome
Video: Course Introduction (4:03)
General Information
Plugin/Reading: Helpful Tips for Course Completion
Grading Scheme

Module 1: Penetration Testing Planning and Discovery
  • Module Introduction and Learning Objectives
  • Video: What is Penetration Testing? (7:40)
  • Video: Penetration Testing Phases (7:12)
  • Activity: Phases of the Penetration Testing Challenge
  • Video: Penetration Testing - Planning Phase (8:29)
  • Video: Penetration Testing - Discovery Phase (5:56)
  • Reading: Examples of passive and active reconnaissance
  • Reading: Google Dorking
  • Hands-on Lab: Practicing Google Dorking Commands
  • Practice Quiz: Penetration Testing Planning and Discovery
  • Reading: Summary and Highlights: Penetration Testing Planning and Discovery
  • Module Glossary: Penetration Testing Planning and Discovery Phases
  • Graded Assignment: Graded Quiz: Penetration Testing Planning and Discovery
Module 2: Penetration Testing: Attack Phase
  • Module Introduction and Learning Objectives
  • Video: Penetration Testing: Attack Phase (6:02)
  • Reading: Penetration Testing Tools
  • Hands-on Lab: Penetration Testing
  • Video: Port Scanning (6:52)
  • Lab: Port Scanning with NMap
  • Lab: Scanning Network Environment with NMap
  • Video: Overview Of Network Protocol Analyzers (7:05)
  • Hands-on Lab: Network Protocol Analyzers
  • Practice Quiz: Penetration Testing: Attack Phase
  • Summary and Highlights: Penetration Testing: Attack Phase
  • Reading: Glossary:  Penetration Testing: Attack Phase
  • Graded Assignment: Graded Quiz: Penetration Testing: Attack Phase
Module 3: Penetration Testing: Reporting Phase
  • Module Introduction and Learning Objectives
  • Video: Software and Application Pen Testing (6:50)
  • Video: Scanning Code Repositories (5:28)
  • Hands-on Lab: Getting started with GitHub (optional)
  • Hands-on Lab: Using SNYK to scan your code repository (optional)
  • Video: Penetration Testing - Reporting Phase (7:35)
  • Reading: PTES Framework
  • Activity: PTES Framework
  • Practice Quiz: Penetration Testing Reporting
  • Reading: Summary and Highlights:  Penetration Testing: Reporting Phase
  • Plugin/Reading: Glossary:  Penetration Testing: Reporting Phase
  • Graded Assignment: Graded Quiz: Penetration Testing: Reporting Phase
Module 4: Threat Hunting and Threat Intelligence
  • Module Introduction and Learning Objectives
  • Video: Threat Hunting Overview (5:09)
  • Video: Threat Intelligence Overview (5:09)
  • Reading: Threat Intelligence Process
  • Activity: Implement Threat Intelligence
  • Reading: Threat Intelligence Sources
  • Lab: Review X-Force Exchange Threat Reports
  • Video: Security Information and Event Management (7:13)
  • Video: AI in Threat Intelligence and Threat Hunting (5:17)
  • Reading: User and Entity Behavior Analytics
  • Video: Threat Intelligence Framework Overview (7:15)
  • Reading: Use Cases of the MITRE ATT&CK Model and the Diamond Model of Intrusion Analysis
  • Practice Quiz: Threat Intelligence Platforms and Frameworks
  • Reading: Summary and Highlights: Threat Hunting and Threat Intelligence
  • Plugin/Reading: Glossary: Threat Hunting and Threat Intelligence
  • Graded Assignment: Graded Quiz: Threat Hunting and Threat Intelligence
Module 5: Cryptography: Principles and Techniques
  • Module Introduction and Learning Objectives
  • Video: Importance of Cryptography (6:12)
  • Video:  Overview of Encryption, Decryption, and Hashing (6:32)
  • Video: Symmetric and Asymmetric Encryption (6:16)
  • Reading: Essentials of Cryptography and Security
  • Lab : End of Encryption/ Decryption (RSA Algorithm)
  • Video: Common Cryptographic Attacks (6:32)
  • Video: Securing SSL/TLS and Strengthening Key Management Edit Set Access Page Actions (4:20)
  • Video: Cryptanalysis and Its Impact on Encryption (6:55)
  • Reading: Cryptographic Algorithms, Applications, and Attacks
  • Lab : Cryptoanalysis Attack
  • Reading: Quantum-Safe Cryptography
  • Video: IBM Quantum Safe Cryptography Solutions (3:17)
  • Practice Quiz: Cryptographic Attacks
  • Reading: Summary and Highlights: Cryptography: Principles and Techniques
  • Plugin/Reading: Glossary: Cryptography: Principles and Techniques
  • Graded Quiz: Cryptography and Cryptographic Attacks
Module 6: Final Project and Final Quiz
  • Module Introduction and Learning Objectives
  • Project Overview
  • Final Project: Part 1 - Perform Vulnerability Analysis and Penetration Testing
  • Final Project: Part 2 - Secure Information Using Symmetric Encryption
  • Peer Graded Assignment
  • Course Glossary
  • Video: Course Highlights and Key Takeaways (7:25)
Course Wrap-Up
  • Reading: Congratulations and Next Steps
  • Reading: Team and Acknowledgments
  • Copyrights and Trademarks
Course Rating

Claim your Badge

General Information

  • This course is self-paced.  
  • This platform works best with current versions of Chrome, Edge, Firefox, Internet Explorer, or Safari. 

Recommended Skills Prior to Taking this Course

A basic understanding of IT systems and cybersecurity principles is recommended prior to enrollment. 

Instructors

Rav Ahuja

Global Program Director, IBM Skills Network

Rav Ahuja is a Global Program Director at IBM. He leads growth strategy, curriculum creation, and partner programs for the IBM Skills Network. Rav co-founded Cognitive Class, an IBM led initiative to democratize skills for in demand technologies. He is based out of the IBM Canada Lab in Toronto and specializes in instructional solutions for AI, Data, Software Engineering and Cloud. Rav presents at events worldwide and has authored numerous papers, articles, books and courses on subjects in managing and analyzing data. Rav holds B. Eng. from McGill University and MBA from University of Western Ontario.

Read more