Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Cyber Defense: Penetration Testing, Threat Hunting, and Cryptography

IBM via edX

Overview

The cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture.

During the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into threat intelligence. Plus, you’ll learn to leverage cyber threat intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods.

To complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity.

This course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course.

If you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume.

Syllabus

Course Syllabus

Module 1: Penetration Testing: Planning and Discovery Phases

Module 2: Penetration Testing: Attack Phase

Module 3: Penetration Testing: Reporting Phase

Module 4: Threat Hunting and Threat Intelligence

Module 5: Cryptography: Techniques and Principles

Module 6: Final Project, Course Wrap-Up, and Final Quiz

Taught by

Skills Network

Reviews

4.4 rating at edX based on 12 ratings

Start your review of Cyber Defense: Penetration Testing, Threat Hunting, and Cryptography

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.