EB
Mar 5, 2023
after knowing the basic knowledge with high standards applied and taught in detail by IBM, so understanding can be achieved. This section is very useful when entering the world of cybersecurity work.
T
Oct 13, 2022
The course has really helped me learn lots of things conserning penetration testing and digital forensiscs and also bash scripting. All credits to IBM for their humbleness in teachng very well .
By Effat E
•Mar 29, 2021
What I liked most about this course in comparison to others is the added video of the presenter next to the slides content. This helped me focus and absorb the content better.
By lai y
•Mar 28, 2021
I learn something , if got some written assessment is much better for learners to test the knowledges and the key takeaways
By Michael M
•Oct 8, 2020
I ABSOLUTELY Enjoyed learning about Mostly Forensics. Like out of all it caught my attention! I'd do it again if I can!
By Jose N N
•Mar 25, 2023
Amazing course again. Learned so much and I love the Python basics!
By Merryl A
•Jun 26, 2021
Its not as good as per IBM standards as it was just one person reading sentences from the slides.
Python and scripting was interesting though.
By Olumide E O
•Oct 21, 2021
It's okay. But it could have been much better. I expected more becuase of the quality standard set by earlier courses in the specialization.
By B
•Jan 19, 2023
Too theory based and not enough practical application. There are some good external resources for learning pentesting skills and seeing how IBM's QRadar works, but the entire Python section needs to be entirely reworked, from the voice recordings all the way to the content and, at the very least, add resources that show practical application of Python for cybersecurity.
By Jason L
•Mar 19, 2021
The course does not accurately display the amount of time required to complete this week; do expect twice the amount stated, as there is lab work.
By Joseph L
•Aug 10, 2020
The presenter in the videos was boring and just read the script. There were many grammatical errors in the questions. I believe there to be factual errors in the questions. Finally, the content seemed arbitrary, like the final week quiz was just basic python and CS history. All in all, a very poor offering from IBM and I would be ashamed to have my company logo on this course product.
By Jonathan V C
•Apr 1, 2021
Of all the certification courses I wanted to reach this one to learn, practically, how to do penetration testing, but again all this certification it's only theory. A short video mentioning that Kali Linux got all you need for penetration testing and nothing else, everyone interested on penetration testing knows that, thank you. Completly dissapointed.
By Willem V
•Feb 16, 2022
Some of the Audio is the worst I have ever heard. I have to print out the lecture just to understand what was said. Coursera should investigate this, and get IBM to provide proper lectures. Im very disappointed with Coursera.
By Afraa W
•Feb 5, 2022
I can't get certificate just because coursera can't recognize my id. Please have a look at this issue. It is very saddening as well as disappointing
By Francesco B
•Jun 12, 2024
As an Engineering student interested in cybersecurity, I enrolled in the "Penetration Testing, Incident Response, and Forensics" course with high expectations, and I must say it exceeded them in several aspects. This course is structured to provide a comprehensive understanding of three crucial domains within cybersecurity: penetration testing, incident response, and digital forensics. It starts with a solid foundation in penetration testing techniques, covering both ethical hacking methodologies and practical exercises to simulate real-world scenarios. The hands-on labs were particularly valuable, allowing us to apply theoretical knowledge to actual systems and networks, thereby honing our skills in identifying vulnerabilities and exploiting them responsibly. Moving into incident response, the course delved into the strategies and protocols necessary to detect, analyze, and mitigate cybersecurity incidents effectively. This section emphasized the importance of preparation and rapid response, which are critical in minimizing damage and recovering from attacks swiftly. The digital forensics segment provided a deep dive into investigative techniques used to gather and analyze digital evidence. From file system analysis to memory forensics, the course equipped us with the tools and methodologies essential for conducting thorough investigations, whether for legal proceedings or internal incident reviews. One of the standout features of the course was its integration of industry best practices and real-world case studies. Learning from actual breaches and successful penetration testing engagements brought a practical dimension to the theoretical concepts covered in lectures. Moreover, the instructors were highly knowledgeable and experienced, providing valuable insights and guidance throughout the course. The course concluded with a comprehensive project that challenged us to apply all three domains—penetration testing, incident response, and forensics—within a simulated cyber attack scenario. This project not only tested our technical skills but also our ability to think critically under pressure, mimicking the demands of cybersecurity professionals in the field. Overall, "Penetration Testing, Incident Response, and Forensics" proved to be an enriching and rewarding experience. It provided me with a solid foundation in key cybersecurity domains and equipped me with practical skills that are directly applicable in today's threat landscape. I would highly recommend this course to anyone looking to pursue a career in cybersecurity or deepen their understanding of offensive and defensive security strategies.
By Augustine S
•Sep 14, 2024
This course offers a comprehensive introduction to the core aspects of cybersecurity, covering three essential pillars: Penetration Testing, Incident Response, and Digital Forensics. Each area is critical for protecting and investigating security breaches in IT infrastructures. 1. Penetration Testing Penetration testing (pentesting) focuses on proactive security by simulating cyberattacks to identify vulnerabilities before they can be exploited by malicious actors. The course thoroughly explains the methodologies used by ethical hackers to uncover weaknesses in systems, networks, and applications. Key Highlights: Understanding the penetration testing lifecycle, including reconnaissance, scanning, exploitation, and post-exploitation. Introduction to widely used tools such as Metasploit, Nmap, and Burp Suite. Practical scenarios where learners get to conduct vulnerability assessments and security tests on real-world systems. Emphasis on ethical hacking, compliance with legal regulations, and responsible disclosure practices. 2. Incident Response The Incident Response (IR) section emphasizes the reactive side of cybersecurity, focusing on how organizations detect, contain, and recover from security breaches. The course outlines best practices for responding to cyberattacks and minimizing damage. Key Highlights: Incident response lifecycle: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, and Post-Incident Activities. Detailed coverage of how to prepare an incident response plan (IRP), including team roles, communication, and tools. Insights into threat intelligence, triage, containment strategies, and evidence preservation. Practical steps for post-incident analysis, such as lessons learned and improving future responses. 3. Digital Forensics The forensics module dives into the investigative side of cybersecurity, focusing on how to gather and analyze evidence from digital systems to identify the nature and scope of an attack. This area is crucial for both legal prosecution and improving future security measures. Key Highlights: Explanation of how digital forensics supports criminal investigations, internal audits, and incident response. Techniques for collecting, preserving, and analyzing evidence in a way that maintains its integrity, such as chain of custody. Introduction to forensic tools like EnCase, FTK, and Autopsy. Focus on file systems, network forensics, and memory forensics. Importance of documentation, reporting, and presenting forensic findings in legal contexts.
By Keith S
•Oct 16, 2022
This course was set up for success. Easy to follow instructing. Videos were really well put together. Seeing how I am a note take I loved the fact that the videos had transcripts. I could take notes as I read them and then watch the videos to see it in action.
I learned a lot and found out other areas to explore with the tools that were mentioned in all of the videos.
I will be taking more classes like this one.
By Mikey S
•Jan 30, 2022
This course was great, the level of difficulty is good. I need to go back and review some things. The one thing that needs to be updated are the links to the Advanced Digital Forensics lab and the link to the virtual environment for the Beginning Digital Forensics lab. The Python lab doesn't work either, I will try the instructions again.
Great course and I love hands-on things like going through the QRadar lab.
By Cleiton C
•Dec 5, 2022
Nota Agradecimento Curso
💞 I LOVE IBM , the courses and opportunities you offer. You don't know me, know that IBM courses and training platforms have the same life. Today I am successful and I am happy.!!! 🏆
I am immensely GRATEFUL to IBM and the team of Devs who are behind these educational works and projects. 💝✨🥷👩💻✍️
Thank's!!!
Cleiton Corrêa- Senior Engineer Software -
Bauru/São Paulo - Brasil
By nouf
•Aug 9, 2020
It was a great introductory course on really interesting and important topics, gave us quite enough on each and every one of them. The course doesn't require deep knowledge in cybersecurity and depends a lot on self learning! I loved the resources that the course included from labs to articles to tools, they were all so helpful and great to explore!
By Kevin E M J
•Sep 14, 2022
I am in school for my BS in CyberSecurity with a focus on Intelligence and Forensic Studies. This course pushed me, and will make me better at my job. This course will ultimately help me to better analyze and detect problems faster, and by doing that I will be able to save companies, or my government millions of dollars in the long run.
By Cassian R
•Apr 30, 2023
The Course is an excellent opportunity for a beginner to commence the Cybersecurity ecosystem and the resources are abundant, relevant and direct the user in the right direction. The quiz have been created to make it challenging and interesting to complete them. It is a totally immersive course. Thank you Coursera.
By Mohamed A H O
•Jul 25, 2021
I really appreciate the great effort of Coursera and IBM for this course, it is really a great experience learning this course. This course gives all the knowledge required to start career in Cyber Security domain with all the concepts and other documentations attached. Very much Helpful. Thank you so much..
By Jimmy M A
•Dec 3, 2021
The more I learn the more I feel there is to learn. These courses are amazing! I want to become the best analyst I can and I realize this will be a challenge. The information provided in the course along with the links to other sites is a treasure chest of information.
By Sergio H A
•Jan 28, 2023
I like very much this course because is plenty of new items to me, I think is complete and have many resources that can be consulted and get additional knowledge. The laboratories were amazing and easy to realize.
Congratulations to instructors sen my bes regards!
By Alexandre d S S
•Oct 13, 2024
Gostaria de expressar minha gratidão pelo excelente curso "Penetration Testing, Incident Response and Forensics" oferecido pela IBM. Esta experiência tem sido fundamental para o meu desenvolvimento profissional e pessoal na área de cibersegurança.
By Elvis S
•Nov 8, 2021
Although many of the materials i was already prepared from different learnings this course really helps out with many missing pieces of information and details !
For sure a must to have and learn for everyone who is an enthusiast in CyberSecurity