Back to Catalog

IBM Ethical Hacking with OS Tools Professional Certificate

PremiumIntermediateProfessional Certificate

Master key ethical hacking tools in just 2-3 months. Explore Kali Linux, Wireshark, Metasploit, OpenVAS, and Gen AI for penetration testing, vulnerability assessment, and incident response.

Language

  • English

Skills You Will Learn

  • Application Security, Cyber Governance, Cyber Risk, Cyber Security, Cyber Security Policies, CyberSecurity, Data Ethics, Distributed Denial-Of-Service (DDoS) Attacks, Ethical Hacking, Incident Response, Information Systems Security, Kali Linux, Metasploit, Network Analysis, Network Security, Network Troubleshooting, OpenVAS, Pen Testing, Risk Mitigation, Security Testing, Software Installation, Threat Management, Virtual Machines, Vulnerability Assessment, Vulnerability Assessments

Offered By

  • IBM

Platform

  • SkillsNetwork

Last Update

  • May 17, 2026
About this Professional Certificate
This program equips you with the practical, job-ready skills used by successful ethical hackers — all in just 2-3 months. Ethical hacking involves authorized testing of computer systems to uncover security weaknesses before malicious actors can exploit them. 

In this Professional Certificate, you will: 
  • Define key ethical and legal principles governing ethical hacking and responsible disclosure practices.
  • Explain the roles, responsibilities, and ethical distinctions between white hat, gray hat, and black hat hackers.
  • Apply Kali Linux tools to perform reconnaissance, vulnerability assessment, and exploitation within controlled environments.
  • Demonstrate the use of Metasploit and OpenVAS to execute controlled exploits and vulnerability scans.
  • Use Wireshark to evaluate system and network vulnerabilities by interpreting penetration test results and prioritizing risk mitigation strategies.
  • Create professional security assessment reports that document findings, ethical considerations, and recommended remediation actions.
 
Program Overview 
 
The demand for cybersecurity professionals continues to rise, with information security jobs projected to grow 32% by 2032 (U.S. Bureau of Labor Statistics). As ethical hacking becomes an essential part of modern cybersecurity strategies, skilled ethical hackers are increasingly sought after to safeguard organizations from evolving threats.

Through structured labs and real-world projects, you’ll learn how to identify, assess, and mitigate vulnerabilities to strengthen digital defenses.
You’ll gain hands-on experience with industry-standard open-source tools such as Kali Linux, Metasploit, Wireshark and OpenVAS, while also exploring the ethical and legal foundations of cybersecurity practice. Under the guidance of IBM cybersecurity experts, you’ll learn to conduct controlled penetration tests, perform ethical exploitations, and develop effective incident response strategies.
By the end of the program, you’ll have built a professional portfolio demonstrating your ability to perform ethical hacking tasks and communicate findings clearly — preparing you for roles such as Ethical Hacker, Penetration Tester, Security Analyst, or Incident Responder.

Applied Learning Projects:
Throughout the program, you’ll complete hands-on projects simulating real-world cybersecurity scenarios. These projects help you apply theory to practice and develop a well-rounded skillset in ethical hacking.

Key projects include:
  • Perform controlled penetration tests in virtual environments using Kali Linux 
  • Capture and analyze network traffic with Wireshark to identify vulnerabilities 
  • Use Metasploit to execute ethical exploits in isolated systems 
  • Run vulnerability scans with OpenVAS and develop structured incident response plans 
  • Practice responsible reporting by documenting discovered vulnerabilities and following ethical disclosure procedures aligned with legal and organizational guidelines. 
  • Explore how AI-powered tools can enhance threat detection, vulnerability analysis, and penetration testing efficiency in modern cybersecurity practices. 
 
Each project enhances your technical and analytical capabilities, helping you confidently identify, analyze, and resolve security vulnerabilities in professional settings.

Whether you’re looking to launch a cybersecurity career or advance into a specialist role such as Ethical Hacker, Penetration Tester, Security Analyst, or Incident Responder, this program will equip you with the job-ready experience and portfolio to stand out in a competitive field. 

You’ll also work with advanced tools and techniques used by professionals, including Wireshark, OpenVAS, Metasploit, and Kali Linux, to perform real-world security testing and analysis. 

Finally, through the Capstone project, you’ll explore how AI-powered tools can enhance threat detection, vulnerability assessment, and penetration testing efficiency, applying your skills in a realistic cybersecurity scenario. 

Enroll today to start building the ethical hacking skills that employers around the world are looking for. 
 
Job Outlook 
 
There is a worldwide shortage of over 3 million skilled cybersecurity experts. (Source: ISC²). 

With 93% of organizations experiencing two or more identity-related breaches in the past year, demand for risk management and cybersecurity skills is skyrocketing. (Source: Coursera Job Skills Report) 

More than 50% of public organizations say a lack of resources and skills is their biggest obstacle to achieving cyber resilience. (Source: Coursera Job Skills Report) 

Earning this certificate positions you for entry-level roles such as: 
  • Ethical Hacker 
  • Penetration Tester 
  • Vulnerability Analyst 
  • Cybersecurity Analyst 
  • Security Operations Center (SOC) Specialist 

With IBM’s industry-recognized credential, you’ll demonstrate job-ready ethical hacking skills and the ability to protect systems using real-world, open-source tools.

Prerequisites 

Learners should have a basic understanding of IT and cybersecurity fundamentals before starting this course. You will also need access to a desktop or laptop computer capable of running Kali Linux and other cybersecurity tools used throughout the hands-on activities. The following are requirements for the Professional Certificate:

  • This Professional Certificate requires fundamental knowledge of IT concepts and basic cybersecurity principles.  The program starts with fundamentals and progressively builds more advanced skills using open-source cybersecurity tools.
  • To complete the hands-on exercises in this Professional Certificate, you will need your own desktop or laptop computer capable of running virtualization software and supporting the cybersecurity tools used in the course. You must install several tools, including Kali Linux (via virtualization), Wireshark, Metasploit, and OpenVAS. A reliable internet connection is also required to download these tools and access course materials. Chromebooks, tablets, or systems without virtualization capabilities will not be sufficient for completing the practical components of this program.

Courses and Projects in this Professional Certificate