Chevron Left
Back to Penetration Testing, Threat Hunting, and Cryptography

Learner Reviews & Feedback for Penetration Testing, Threat Hunting, and Cryptography by IBM

4.6
stars
2,375 ratings

About the Course

The cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture. During the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into threat intelligence. Plus, you’ll learn to leverage Cyber Threat Intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods. To complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity. This course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course. If you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume....

Top reviews

EB

Mar 5, 2023

after knowing the basic knowledge with high standards applied and taught in detail by IBM, so understanding can be achieved. This section is very useful when entering the world of cybersecurity work.

T

Oct 13, 2022

The course has really helped me learn lots of things conserning penetration testing and digital forensiscs and also bash scripting. All credits to IBM for their humbleness in teachng very well .

Filter by:

26 - 50 of 519 Reviews for Penetration Testing, Threat Hunting, and Cryptography

By Effat E

Mar 29, 2021

What I liked most about this course in comparison to others is the added video of the presenter next to the slides content. This helped me focus and absorb the content better.

By lai y

Mar 28, 2021

I learn something , if got some written assessment is much better for learners to test the knowledges and the key takeaways

By Michael M

Oct 8, 2020

I ABSOLUTELY Enjoyed learning about Mostly Forensics. Like out of all it caught my attention! I'd do it again if I can!

By Jose N N

Mar 25, 2023

Amazing course again. Learned so much and I love the Python basics!

By Merryl A

Jun 26, 2021

Its not as good as per IBM standards as it was just one person reading sentences from the slides.

Python and scripting was interesting though.

By Olumide E O

Oct 21, 2021

It's okay. But it could have been much better. I expected more becuase of the quality standard set by earlier courses in the specialization.

By B

Jan 19, 2023

Too theory based and not enough practical application. There are some good external resources for learning pentesting skills and seeing how IBM's QRadar works, but the entire Python section needs to be entirely reworked, from the voice recordings all the way to the content and, at the very least, add resources that show practical application of Python for cybersecurity.

By Jason L

Mar 19, 2021

The course does not accurately display the amount of time required to complete this week; do expect twice the amount stated, as there is lab work.

By Joseph L

Aug 10, 2020

The presenter in the videos was boring and just read the script. There were many grammatical errors in the questions. I believe there to be factual errors in the questions. Finally, the content seemed arbitrary, like the final week quiz was just basic python and CS history. All in all, a very poor offering from IBM and I would be ashamed to have my company logo on this course product.

By Jonathan V C

Apr 1, 2021

Of all the certification courses I wanted to reach this one to learn, practically, how to do penetration testing, but again all this certification it's only theory. A short video mentioning that Kali Linux got all you need for penetration testing and nothing else, everyone interested on penetration testing knows that, thank you. Completly dissapointed.

By Willem V

Feb 16, 2022

Some of the Audio is the worst I have ever heard. I have to print out the lecture just to understand what was said. Coursera should investigate this, and get IBM to provide proper lectures. Im very disappointed with Coursera.

By Afraa W

Feb 5, 2022

I can't get certificate just because coursera can't recognize my id. Please have a look at this issue. It is very saddening as well as disappointing

By Francesco B

Jun 12, 2024

As an Engineering student interested in cybersecurity, I enrolled in the "Penetration Testing, Incident Response, and Forensics" course with high expectations, and I must say it exceeded them in several aspects. This course is structured to provide a comprehensive understanding of three crucial domains within cybersecurity: penetration testing, incident response, and digital forensics. It starts with a solid foundation in penetration testing techniques, covering both ethical hacking methodologies and practical exercises to simulate real-world scenarios. The hands-on labs were particularly valuable, allowing us to apply theoretical knowledge to actual systems and networks, thereby honing our skills in identifying vulnerabilities and exploiting them responsibly. Moving into incident response, the course delved into the strategies and protocols necessary to detect, analyze, and mitigate cybersecurity incidents effectively. This section emphasized the importance of preparation and rapid response, which are critical in minimizing damage and recovering from attacks swiftly. The digital forensics segment provided a deep dive into investigative techniques used to gather and analyze digital evidence. From file system analysis to memory forensics, the course equipped us with the tools and methodologies essential for conducting thorough investigations, whether for legal proceedings or internal incident reviews. One of the standout features of the course was its integration of industry best practices and real-world case studies. Learning from actual breaches and successful penetration testing engagements brought a practical dimension to the theoretical concepts covered in lectures. Moreover, the instructors were highly knowledgeable and experienced, providing valuable insights and guidance throughout the course. The course concluded with a comprehensive project that challenged us to apply all three domains—penetration testing, incident response, and forensics—within a simulated cyber attack scenario. This project not only tested our technical skills but also our ability to think critically under pressure, mimicking the demands of cybersecurity professionals in the field. Overall, "Penetration Testing, Incident Response, and Forensics" proved to be an enriching and rewarding experience. It provided me with a solid foundation in key cybersecurity domains and equipped me with practical skills that are directly applicable in today's threat landscape. I would highly recommend this course to anyone looking to pursue a career in cybersecurity or deepen their understanding of offensive and defensive security strategies.

By Augustine S

Sep 14, 2024

This course offers a comprehensive introduction to the core aspects of cybersecurity, covering three essential pillars: Penetration Testing, Incident Response, and Digital Forensics. Each area is critical for protecting and investigating security breaches in IT infrastructures. 1. Penetration Testing Penetration testing (pentesting) focuses on proactive security by simulating cyberattacks to identify vulnerabilities before they can be exploited by malicious actors. The course thoroughly explains the methodologies used by ethical hackers to uncover weaknesses in systems, networks, and applications. Key Highlights: Understanding the penetration testing lifecycle, including reconnaissance, scanning, exploitation, and post-exploitation. Introduction to widely used tools such as Metasploit, Nmap, and Burp Suite. Practical scenarios where learners get to conduct vulnerability assessments and security tests on real-world systems. Emphasis on ethical hacking, compliance with legal regulations, and responsible disclosure practices. 2. Incident Response The Incident Response (IR) section emphasizes the reactive side of cybersecurity, focusing on how organizations detect, contain, and recover from security breaches. The course outlines best practices for responding to cyberattacks and minimizing damage. Key Highlights: Incident response lifecycle: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, and Post-Incident Activities. Detailed coverage of how to prepare an incident response plan (IRP), including team roles, communication, and tools. Insights into threat intelligence, triage, containment strategies, and evidence preservation. Practical steps for post-incident analysis, such as lessons learned and improving future responses. 3. Digital Forensics The forensics module dives into the investigative side of cybersecurity, focusing on how to gather and analyze evidence from digital systems to identify the nature and scope of an attack. This area is crucial for both legal prosecution and improving future security measures. Key Highlights: Explanation of how digital forensics supports criminal investigations, internal audits, and incident response. Techniques for collecting, preserving, and analyzing evidence in a way that maintains its integrity, such as chain of custody. Introduction to forensic tools like EnCase, FTK, and Autopsy. Focus on file systems, network forensics, and memory forensics. Importance of documentation, reporting, and presenting forensic findings in legal contexts.

By Keith S

Oct 16, 2022

This course was set up for success. Easy to follow instructing. Videos were really well put together. Seeing how I am a note take I loved the fact that the videos had transcripts. I could take notes as I read them and then watch the videos to see it in action.

I learned a lot and found out other areas to explore with the tools that were mentioned in all of the videos.

I will be taking more classes like this one.

By Mikey S

Jan 30, 2022

This course was great, the level of difficulty is good. I need to go back and review some things. The one thing that needs to be updated are the links to the Advanced Digital Forensics lab and the link to the virtual environment for the Beginning Digital Forensics lab. The Python lab doesn't work either, I will try the instructions again.

Great course and I love hands-on things like going through the QRadar lab.

By Cleiton C

Dec 5, 2022

Nota Agradecimento Curso

💞 I LOVE IBM , the courses and opportunities you offer. You don't know me, know that IBM courses and training platforms have the same life. Today I am successful and I am happy.!!! 🏆

I am immensely GRATEFUL to IBM and the team of Devs who are behind these educational works and projects. 💝✨🥷👩💻✍️

Thank's!!!

Cleiton Corrêa- Senior Engineer Software -

Bauru/São Paulo - Brasil

By nouf

Aug 9, 2020

It was a great introductory course on really interesting and important topics, gave us quite enough on each and every one of them. The course doesn't require deep knowledge in cybersecurity and depends a lot on self learning! I loved the resources that the course included from labs to articles to tools, they were all so helpful and great to explore!

By Kevin E M J

Sep 14, 2022

I am in school for my BS in CyberSecurity with a focus on Intelligence and Forensic Studies. This course pushed me, and will make me better at my job. This course will ultimately help me to better analyze and detect problems faster, and by doing that I will be able to save companies, or my government millions of dollars in the long run.

By Cassian R

Apr 30, 2023

The Course is an excellent opportunity for a beginner to commence the Cybersecurity ecosystem and the resources are abundant, relevant and direct the user in the right direction. The quiz have been created to make it challenging and interesting to complete them. It is a totally immersive course. Thank you Coursera.

By Mohamed A H O

Jul 25, 2021

I really appreciate the great effort of Coursera and IBM for this course, it is really a great experience learning this course. This course gives all the knowledge required to start career in Cyber Security domain with all the concepts and other documentations attached. Very much Helpful. Thank you so much..

By Jimmy M A

Dec 3, 2021

The more I learn the more I feel there is to learn. These courses are amazing! I want to become the best analyst I can and I realize this will be a challenge. The information provided in the course along with the links to other sites is a treasure chest of information.

By Sergio H A

Jan 28, 2023

I like very much this course because is plenty of new items to me, I think is complete and have many resources that can be consulted and get additional knowledge. The laboratories were amazing and easy to realize.

Congratulations to instructors sen my bes regards!

By Alexandre d S S

Oct 13, 2024

Gostaria de expressar minha gratidão pelo excelente curso "Penetration Testing, Incident Response and Forensics" oferecido pela IBM. Esta experiência tem sido fundamental para o meu desenvolvimento profissional e pessoal na área de cibersegurança.

By Elvis S

Nov 8, 2021

Although many of the materials i was already prepared from different learnings this course really helps out with many missing pieces of information and details !

For sure a must to have and learn for everyone who is an enthusiast in CyberSecurity