Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Information security jobs are projected to grow 32% by 2032 (US Bureau of Labor Statistics). With ethical hacking now a key component of an effective cybersecurity strategy, skilled ethical hackers are in high demand! This program gives you the job-ready skills using key tools successful ethical hackers use in just 2 months.
Ethical hacking is authorized testing of computer systems to find security weaknesses before attackers can exploit them. Ethical hackers run penetration tests, assess vulnerabilities, and recommend fixes to help protect organizations from cyber threats.
This program builds your knowledge and hands-on experience of popular open source cybersecurity tools: Kali Linux, Wireshark, Metasploit, and OpenVAS. You’ll explore ethical and legal fundamentals and then look at each tool's capabilities to build comprehensive skills for identifying, analyzing, and tackling security vulnerabilities.
Guided by IBM's cybersecurity experts, you’ll learn to conduct controlled penetration tests, analyze network traffic for suspicious activity, execute ethical exploitation techniques, and implement effective incident response strategies. Plus, you’ll complete real-world hands-on labs and projects you can add to your portfolio to showcase your skills to potential employers.
If you’re looking to skill up using key ethical hacking tools to become an Ethical Hacker, Penetration Tester, Security Analyst, or Incident Responder, enroll today!
Syllabus
- Course 1: Introduction to Ethical Hacking Principles
- Course 2: Ethical Hacking with Kali Linux
- Course 3: Exploitation and Penetration Testing with Metasploit
- Course 4: Network Traffic Analysis with Wireshark
- Course 5: Incident Response and Defense with OpenVAS
- Course 6: Ethical Hacking Capstone Project: Breach, Response, AI
Courses
-
Kali Linux is the go-to operating system for penetration testers, ethical hackers, and security professionals. This course blends cybersecurity knowledge with practical applications to give you the job-ready skills you need to use Kali Linux effectively in just 5 weeks! Ethical hackers—also known as “white hat” hackers—test systems and networks to uncover vulnerabilities. They often use Kali Linux to conduct network monitoring, penetration testing, and security auditing, as it provides hundreds of pre-installed tools to practice reconnaissance and analysis. During the course, you’ll get an overview of the Kali Linux operating system and learn how to install and configure it. You’ll then dive into automation options, explore both Bash and Python scripting languages, and discover how to customize configurations to meet your specific needs. To get the most from the course, foundational cybersecurity knowledge is required. Our Information Technology (IT) Fundamentals for Everyone and Cybersecurity Fundamentals Specialization provide the ideal grounding. If you’re looking to leverage the power of Kali Linux in your ethical hacking career, enroll today!
-
Metasploit is one of the best-known and most used cybersecurity technologies for penetration testing (Cyber Security News). This short course gives you the job-ready skills in exploitation techniques and penetration testing using Metasploit employers are looking for. During the course, you’ll explore Metasploit’s core functionalities, gaining valuable hands-on experience in exercises that cover real-world exploitation scenarios, including network, system, and web application attacks. Plus, you’ll dive into post-exploitation tactics, persistence techniques, and attack simulations, building the skills you need for both ethical hacking and red teaming. By the end of the course, you’ll be able to conduct advanced penetration tests, execute sophisticated exploits, and understand the tactics used by attackers to compromise systems. Plus, you’ll be able to identify vulnerabilities and implement effective countermeasures to defend against these threats. If those are hands-on skills you want on your resume in 4 weeks’ time, enroll today!
-
Build job-ready cybersecurity skills through practical experience in incident response and vulnerability assessment using OpenVAS. Designed for cybersecurity professionals and aspiring ethical hackers, this course immerses you in realistic lab environments where you’ll install and configure OpenVAS, run scans, interpret CVSS scores, and identify vulnerabilities across networked systems. As you progress, you’ll learn to detect threats by analyzing system and network logs, correlating scan results with known attack patterns, and applying proven containment strategies. You’ll go beyond just technical execution and learn to prioritize risks, recommend remediation actions, and document your findings in structured, professional reports. You’ll also integrate threat intelligence and lessons learned into actionable post-incident improvements. A final hands-on project simulates a full incident response lifecycle from detection to reporting—great for job interviews! With guided labs, quizzes, and a final assignment, this course builds real-world readiness and adds a valuable credential to your cybersecurity portfolio. Ready to dive in and defend against real-world threats? Enroll today.
-
Ethical hacking professionals earn $90,000-$150,000 (ZipRecruiter). They’re the frontline defenders against cyber threats in today's high-risk digital landscape and Security Analysts, Penetration Testers, and Security Consultants are in high demand. This introductory course sets you on the path to becoming the skilled security professional employers are looking for! From the start, the course simplifies complex ethical hacking concepts into clear, practical principles. You'll learn the differences between white hat, black hat, and gray hat hacking, explore global cybersecurity regulations like GDPR, CCPA, and CFAA, and understand how to navigate legal boundaries. You’ll dive into vulnerability assessment, responsible disclosure, and security reporting through videos, hands-on activities, and case studies, while interactive podcasts, role-plays, and dialogues provide realistic scenarios to reinforce key ideas and deepen your understanding. If you’re aiming to become a Cybersecurity Specialist, Compliance Officer, or IT Security Manager, this course provides the essential ethical framework and compliance knowledge to launch your career in this rapidly growing field. Enroll today!
-
This course provides hands-on training in network traffic analysis using Wireshark for cybersecurity professionals. You’ll learn to capture, analyze, and interpret network traffic to detect security threats and investigate incidents. Through practical exercises, you’ll gain experience with packet sniffing, protocol analysis, and traffic flow monitoring while working with real-world network data. The curriculum covers essential techniques including Deep Packet Inspection (DPI), traffic filtering, and anomaly detection. You’ll practice identifying malicious patterns like DDoS attacks, port scanning, and data exfiltration attempts. Case studies simulate actual security incidents, teaching you to correlate evidence and trace attack vectors through network traffic. A key focus is developing actionable reporting skills for incident response teams. You’ll learn to document findings, create visualizations of network activity, and present technical details to both security teams and non-technical stakeholders. The course culminates in a capstone project where you analyze a complex traffic capture and produce a professional security assessment report. Designed for aspiring cybersecurity analysts, network administrators, and IT professionals, this training bridges the gap between theoretical knowledge and practical traffic analysis skills. You’ll finish with hands-on experience using industry-standard tools and techniques that are immediately applicable in security operations centers and forensic investigations.
Taught by
Christo Oehley, Dee Dee Collette, IBM Skills Network Team and SkillUp