• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    Chevron Left
    Back to Penetration Testing, Threat Hunting, and Cryptography

    Learner Reviews & Feedback for Penetration Testing, Threat Hunting, and Cryptography by IBM

    Filled StarFilled StarFilled StarFilled StarHalf Faded Star
    4.6
    stars
    2,453 ratings

    About the Course

    The cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who
    can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying
    vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture. During the
    course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code
    repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into thre...
    ...

    Top reviews

    EB

    Mar 6, 2023

    Filled StarFilled StarFilled StarFilled StarFilled Star

    after knowing the basic knowledge with high standards applied and taught in detail by IBM, so understanding can be achieved. This section is very useful when entering the world of cybersecurity work.

    T

    Oct 14, 2022

    Filled StarFilled StarFilled StarFilled StarFilled Star

    The course has really helped me learn lots of things conserning penetration testing and digital forensiscs and also bash scripting. All credits to IBM for their humbleness in teachng very well .

    Filter by:

    26 - 50 of 538 Reviews for Penetration Testing, Threat Hunting, and Cryptography

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Effat E

    •

    Mar 29, 2021

    What I liked most about this course in comparison to others is the added video of the presenter next to the slides content. This helped me focus and absorb the content better.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By lai y

    •

    Mar 28, 2021

    I learn something , if got some written assessment is much better for learners to test the knowledges and the key takeaways

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Michael M

    •

    Oct 8, 2020

    I ABSOLUTELY Enjoyed learning about Mostly Forensics. Like out of all it caught my attention! I'd do it again if I can!

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Jose N N

    •

    Mar 25, 2023

    Amazing course again. Learned so much and I love the Python basics!

    Filled StarFilled StarFilled StarStarStar

    By Merryl A

    •

    Jun 26, 2021

    Its not as good as per IBM standards as it was just one person reading sentences from the slides.

    Python and scripting was interesting though.

    Filled StarFilled StarFilled StarStarStar

    By Olumide E O

    •

    Oct 21, 2021

    It's okay. But it could have been much better. I expected more becuase of the quality standard set by earlier courses in the specialization.

    Filled StarFilled StarStarStarStar

    By B

    •

    Jan 20, 2023

    Too theory based and not enough practical application. There are some good external resources for learning pentesting skills and seeing how IBM's QRadar works, but the entire Python section needs to be entirely reworked, from the voice recordings all the way to the content and, at the very least, add resources that show practical application of Python for cybersecurity.

    Filled StarFilled StarStarStarStar

    By Jason L

    •

    Mar 20, 2021

    The course does not accurately display the amount of time required to complete this week; do expect twice the amount stated, as there is lab work.

    Filled StarStarStarStarStar

    By Joseph L

    •

    Aug 10, 2020

    The presenter in the videos was boring and just read the script. There were many grammatical errors in the questions. I believe there to be factual errors in the questions. Finally, the content seemed arbitrary, like the final week quiz was just basic python and CS history. All in all, a very poor offering from IBM and I would be ashamed to have my company logo on this course product.

    Filled StarStarStarStarStar

    By Jonathan V C

    •

    Apr 2, 2021

    Of all the certification courses I wanted to reach this one to learn, practically, how to do penetration testing, but again all this certification it's only theory. A short video mentioning that Kali Linux got all you need for penetration testing and nothing else, everyone interested on penetration testing knows that, thank you. Completly dissapointed.

    Filled StarStarStarStarStar

    By Willem V

    •

    Feb 16, 2022

    Some of the Audio is the worst I have ever heard. I have to print out the lecture just to understand what was said. Coursera should investigate this, and get IBM to provide proper lectures. Im very disappointed with Coursera.

    Filled StarStarStarStarStar

    By Afraa W

    •

    Feb 5, 2022

    I can't get certificate just because coursera can't recognize my id. Please have a look at this issue. It is very saddening as well as disappointing

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Francesco B

    •

    Jun 13, 2024

    As an Engineering student interested in cybersecurity, I enrolled in the "Penetration Testing, Incident Response, and Forensics" course with high expectations, and I must say it exceeded them in several aspects. This course is structured to provide a comprehensive understanding of three crucial domains within cybersecurity: penetration testing, incident response, and digital forensics. It starts with a solid foundation in penetration testing techniques, covering both ethical hacking methodologies and practical exercises to simulate real-world scenarios. The hands-on labs were particularly valuable, allowing us to apply theoretical knowledge to actual systems and networks, thereby honing our skills in identifying vulnerabilities and exploiting them responsibly. Moving into incident response, the course delved into the strategies and protocols necessary to detect, analyze, and mitigate cybersecurity incidents effectively. This section emphasized the importance of preparation and rapid response, which are critical in minimizing damage and recovering from attacks swiftly. The digital forensics segment provided a deep dive into investigative techniques used to gather and analyze digital evidence. From file system analysis to memory forensics, the course equipped us with the tools and methodologies essential for conducting thorough investigations, whether for legal proceedings or internal incident reviews. One of the standout features of the course was its integration of industry best practices and real-world case studies. Learning from actual breaches and successful penetration testing engagements brought a practical dimension to the theoretical concepts covered in lectures. Moreover, the instructors were highly knowledgeable and experienced, providing valuable insights and guidance throughout the course. The course concluded with a comprehensive project that challenged us to apply all three domains—penetration testing, incident response, and forensics—within a simulated cyber attack scenario. This project not only tested our technical skills but also our ability to think critically under pressure, mimicking the demands of cybersecurity professionals in the field. Overall, "Penetration Testing, Incident Response, and Forensics" proved to be an enriching and rewarding experience. It provided me with a solid foundation in key cybersecurity domains and equipped me with practical skills that are directly applicable in today's threat landscape. I would highly recommend this course to anyone looking to pursue a career in cybersecurity or deepen their understanding of offensive and defensive security strategies.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Augustine S

    •

    Sep 14, 2024

    This course offers a comprehensive introduction to the core aspects of cybersecurity, covering three essential pillars: Penetration Testing, Incident Response, and Digital Forensics. Each area is critical for protecting and investigating security breaches in IT infrastructures. 1. Penetration Testing Penetration testing (pentesting) focuses on proactive security by simulating cyberattacks to identify vulnerabilities before they can be exploited by malicious actors. The course thoroughly explains the methodologies used by ethical hackers to uncover weaknesses in systems, networks, and applications. Key Highlights: Understanding the penetration testing lifecycle, including reconnaissance, scanning, exploitation, and post-exploitation. Introduction to widely used tools such as Metasploit, Nmap, and Burp Suite. Practical scenarios where learners get to conduct vulnerability assessments and security tests on real-world systems. Emphasis on ethical hacking, compliance with legal regulations, and responsible disclosure practices. 2. Incident Response The Incident Response (IR) section emphasizes the reactive side of cybersecurity, focusing on how organizations detect, contain, and recover from security breaches. The course outlines best practices for responding to cyberattacks and minimizing damage. Key Highlights: Incident response lifecycle: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, and Post-Incident Activities. Detailed coverage of how to prepare an incident response plan (IRP), including team roles, communication, and tools. Insights into threat intelligence, triage, containment strategies, and evidence preservation. Practical steps for post-incident analysis, such as lessons learned and improving future responses. 3. Digital Forensics The forensics module dives into the investigative side of cybersecurity, focusing on how to gather and analyze evidence from digital systems to identify the nature and scope of an attack. This area is crucial for both legal prosecution and improving future security measures. Key Highlights: Explanation of how digital forensics supports criminal investigations, internal audits, and incident response. Techniques for collecting, preserving, and analyzing evidence in a way that maintains its integrity, such as chain of custody. Introduction to forensic tools like EnCase, FTK, and Autopsy. Focus on file systems, network forensics, and memory forensics. Importance of documentation, reporting, and presenting forensic findings in legal contexts.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Valère K

    •

    Jan 16, 2025

    Bien le bonjour à mes pairs, Je tiens à remercier chaleureusement les professeurs DeeDee Colette, Jeff Crume, Manish Kumar, Rav Ahuja, ainsi que toute l'équipe pédagogique d'IBM, pour les cours de la spécialisation "IBM Cybersecurity Analyst Certificate". Cette formation a été extrêmement enrichissante et m'a permis d'acquérir des connaissances solides et précieuses en matière de sécurité des actifs numériques, qui constituent une base réelle pour une carrière lumineuse dans le domaine. Je souhaite souligner la qualité des différents quiz notés et non-notés, les laboratoires pratiques, qui se sont révélés très utiles pour appliquer concrètement les notions apprises. Toutefois, je me permets de proposer une amélioration : introduire une nouvelle variation des questions et des réponses à chaque tentative. Cela rendrait l'exercice encore plus engageant et favoriserait une meilleure maîtrise des concepts. Enfin, je suggère l'ajout d'un cours de synthèse, un "Put it all together", qui permettrait de relier les différents concepts et outils enseignés. Une telle initiative offrirait une vision globale unifiée de la cybersécurité (ce que vous avez fait étant déjà assez exceptionnel) et surtout du poste en lui-même, ce qui serait particulièrement bénéfique pour les apprenants. Merci encore pour cette excellente formation et pour votre dévouement à transmettre des connaissances de grande valeur ! Valère Firmin KAMBO TAMBA

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Keith S

    •

    Oct 17, 2022

    This course was set up for success. Easy to follow instructing. Videos were really well put together. Seeing how I am a note take I loved the fact that the videos had transcripts. I could take notes as I read them and then watch the videos to see it in action.

    I learned a lot and found out other areas to explore with the tools that were mentioned in all of the videos.

    I will be taking more classes like this one.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Mikey S

    •

    Jan 30, 2022

    This course was great, the level of difficulty is good. I need to go back and review some things. The one thing that needs to be updated are the links to the Advanced Digital Forensics lab and the link to the virtual environment for the Beginning Digital Forensics lab. The Python lab doesn't work either, I will try the instructions again.

    Great course and I love hands-on things like going through the QRadar lab.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Cleiton C

    •

    Dec 5, 2022

    Nota Agradecimento Curso

    💞 I LOVE IBM , the courses and opportunities you offer. You don't know me, know that IBM courses and training platforms have the same life. Today I am successful and I am happy.!!! 🏆

    I am immensely GRATEFUL to IBM and the team of Devs who are behind these educational works and projects. 💝✨🥷👩💻✍️

    Thank's!!!

    Cleiton Corrêa- Senior Engineer Software -

    Bauru/São Paulo - Brasil

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By nouf

    •

    Aug 9, 2020

    It was a great introductory course on really interesting and important topics, gave us quite enough on each and every one of them. The course doesn't require deep knowledge in cybersecurity and depends a lot on self learning! I loved the resources that the course included from labs to articles to tools, they were all so helpful and great to explore!

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Kevin E M J

    •

    Sep 14, 2022

    I am in school for my BS in CyberSecurity with a focus on Intelligence and Forensic Studies. This course pushed me, and will make me better at my job. This course will ultimately help me to better analyze and detect problems faster, and by doing that I will be able to save companies, or my government millions of dollars in the long run.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Cassian R

    •

    Apr 30, 2023

    The Course is an excellent opportunity for a beginner to commence the Cybersecurity ecosystem and the resources are abundant, relevant and direct the user in the right direction. The quiz have been created to make it challenging and interesting to complete them. It is a totally immersive course. Thank you Coursera.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Mohamed A H O

    •

    Jul 25, 2021

    I really appreciate the great effort of Coursera and IBM for this course, it is really a great experience learning this course. This course gives all the knowledge required to start career in Cyber Security domain with all the concepts and other documentations attached. Very much Helpful. Thank you so much..

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Jimmy M A

    •

    Dec 3, 2021

    The more I learn the more I feel there is to learn. These courses are amazing! I want to become the best analyst I can and I realize this will be a challenge. The information provided in the course along with the links to other sites is a treasure chest of information.

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Sergio H A

    •

    Jan 28, 2023

    I like very much this course because is plenty of new items to me, I think is complete and have many resources that can be consulted and get additional knowledge. The laboratories were amazing and easy to realize.

    Congratulations to instructors sen my bes regards!

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Alexandre d S S

    •

    Oct 14, 2024

    Gostaria de expressar minha gratidão pelo excelente curso "Penetration Testing, Incident Response and Forensics" oferecido pela IBM. Esta experiência tem sido fundamental para o meu desenvolvimento profissional e pessoal na área de cibersegurança.

    • Chevron Left
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • ...
    • 22
    • Chevron Right

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok
    Coursera

    Sign up

    Learn on your own time from top universities and businesses.

    ​
    ​
    Between 8 and 72 characters
    Your password is hidden
    ​

    or

    Already on Coursera?


    I accept Coursera's Terms of Use and Privacy Notice. Having trouble logging in? Learner help center

    This site is protected by reCAPTCHA Enterprise and the Google Privacy Policy and Terms of Service apply.