TrueschoTruescho
All Courses
IBM Ethical Hacking with Open Source Tools
Coursera
Professional Certificate
Unknown

IBM Ethical Hacking with Open Source Tools

IBM

Develop ethical hacking skills to test and secure computer systems using open-source tools in 2 months with hands-on training.

UnknownEnglish

About this Course

Information security jobs are projected to grow 32% by 2032 (US Bureau of Labor Statistics). With ethical hacking now a key component of an effective cybersecurity strategy, skilled ethical hackers are in high demand! This program gives you the job-ready skills using key tools successful ethical hackers use in just 2 months. Ethical hacking is authorized testing of computer systems to find security weaknesses before attackers can exploit them. Ethical hackers run penetration tests, assess vulnerabilities, and recommend fixes to help protect organizations from cyber threats. This program builds your knowledge and hands-on experience of popular open source cybersecurity tools: Kali Linux , Wireshark , Metasploit , and OpenVAS . You’ll explore ethical and legal fundamentals and then look at each tool's capabilities to build comprehensive skills for identifying, analyzing, and tackling security vulnerabilities. Guided by IBM's cybersecurity experts , you’ll learn to conduct controlled penetration tests, analyze network traffic for suspicious activity, execute ethical exploitation techniques, and implement effective incident response strategies. Plus, you’ll complete real-world hands-on labs and projects you can add to your portfolio to showcase your skills to potential employers. If you’re looking to skill up using key ethical hacking tools to become an Ethical Hacker , Penetration Tester , Security Analyst , or Incident Responder , enroll today!

What You'll Learn

  • Analyze roles and responsibilities of ethical hackers
  • Execute simulated attacks using Metasploit
  • Utilize Kali Linux tools for information gathering and vulnerability analysis
  • Apply responsible disclosure and ethical reporting of vulnerabilities

Prerequisites

  • Basic familiarity with topic and terminology
  • Readiness for applied practice and exercises

Instructors

I

IBM Skills Network Team

D

Dee Dee Collette

C

Christo Oehley

S

SkillUp

Topics

Security
Information Technology
Support and Operations
Anomaly Detection
Bash (Scripting Language)
Cyber Security Assessment
Cyber Security Policies
Cyber Threat Intelligence
Cybersecurity
Exploit development

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

الأمن السيبراني
تكنولوجيا المعلومات
الدعم والعمليات
كشف الشذوذ
لغة البرمجة باش
تقييم الأمن السيبراني
سياسات الأمن
معلومات التهديدات السيبرانية
Cybersecurity
Exploit development

Start Learning Now