Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Ready to put your ethical hacking skills to the test and power your cybersecurity career forward?
This hands-on course is ideal for aspiring cybersecurity analysts, ethical hackers, and IT professionals who want to be able to demonstrate their real-world skills in offensive and defensive security to employers.
During this course, you’ll start on the Red Team, using industry-standard tools such as Kali Linux, Nmap, and Metasploit to conduct reconnaissance, exploitation, privilege escalation, and persistence. Then, you’ll shift to the Blue Team, where you’ll practice log analysis, detect Indicators of Compromise, and respond to attacks using OpenVAS and the MITRE ATT&CK framework.
You’ll also explore the growing role of generative AI in cybersecurity, applying AI-assisted reconnaissance, exploit generation, and anomaly detection to strengthen your strategies.
Each lab will challenge you to prove your mastery, culminating in a professional-grade incident response report.
If you’re keen to showcase your ethical hacking prowess and cybersecurity skills through a portfolio-worthy capstone, enroll today!
Syllabus
- Initial Access and Exploitation
- In this module, you will investigate the methods attackers use to gain initial access to a target system. Through hands-on labs, you’ll conduct active network reconnaissance with tools like Nmap and Netdiscover, create and deliver reverse shell payloads using msfvenom, and exploit vulnerabilities with the Metasploit Framework. You will verify successful exploitation and develop a deeper understanding of the tactics employed in the early stages of a cyberattack.
- Privilege Escalation
- In this module, you will learn how attackers escalate privileges after gaining initial access to a system. You’ll start by enumerating system vulnerabilities and identifying potential escalation paths. Using Metasploit's local exploit suggester, you will execute privilege escalation exploits and confirm root-level access on compromised systems.
- Persistence Techniques
- In this module, you will learn how attackers maintain long-term access to compromised systems by implementing persistence techniques. You’ll establish automated reverse shell connections and apply anti-forensic methods to avoid detection. By the end of the lab, you will have a clearer understanding of how attackers ensure continued access, even after reboots or defensive actions.
- Detection and Response
- In this module, you will assume the role of defender by detecting and analyzing signs of system compromise using widely used cybersecurity tools. You will run vulnerability scans with OpenVAS and perform log analysis to uncover Indicators of Compromise (IOCs). This module also introduces mapping findings to the MITRE ATT&CK framework to better understand attacker behavior and improve threat response.
- Generative AI for Offensive and Defensive Cybersecurity
- This module introduces learners to the emerging role of generative AI (GenAI) in cybersecurity. Learners will explore how GenAI tools can accelerate reconnaissance, automate exploit development, assist in social engineering, and enhance red team efficiency. On the defensive side, they will see how GenAI supports detection of anomalous behaviors, speeds up log analysis, and automates parts of the incident response process. Hands-on labs will provide exposure to both opportunities and risks of AI-driven hacking, while highlighting ethical and safe practices for AI use in cybersecurity.
- Reporting and Recovery and Final Project
- In this final stage of the capstone, you will consolidate all your work from the previous modules into a complete, professional-grade incident response package. You’ll learn how to clearly document technical findings, structure a detailed incident report, record Indicators of Compromise (IOCs), and recommend mitigation strategies. You will then package these deliverables—along with screenshots, scan results, and captured flags—into a single submission. This serves as both your final assessment and a demonstration of your ability to apply and communicate cybersecurity skills in a real-world context.
Taught by
Christo Oehley and IBM Skills Network Team