Course Highlights
  • In-demand penetration and threat-hunting skills, supported by hands-on practice that employers are looking for on a resume.
  • Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.
  • How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.
  • Use cryptography and cryptanalysis techniques such as encryption and hashing to ensure data integrity and confidentiality.
Curriculum

  Write a Review

IBM: Cyber Defense: Penetration Testing, Threat Hunting, and Cryptography

Go to Paid Course