IBM
Ethical Hacking Capstone Project: Breach, Response, AI
IBM

Ethical Hacking Capstone Project: Breach, Response, AI

Christo Oehley
IBM Skills Network Team

位教师:Christo Oehley

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
高级设置 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
高级设置 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Demonstrate your hands-on ethical hacking expertise uncovering, remediating system vulnerabilities and leveraging AI to enhance cybersecurity skills

  • Gain practical experience in reconnaissance and exploitation using advanced penetration testing tools like Metasploit

  • Apply privilege escalation and persistence techniques to simulate real-world attacker strategies in security assessments

  • Strengthen defensive skills by detecting threats with OpenVAS, analyzing system logs, and documenting incidents with the MITRE ATT&CK framework

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

October 2025

作业

11 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累 Computer Security and Networks 领域的专业知识

本课程是 IBM Ethical Hacking with Open Source Tools 专业证书 专项课程的一部分
在注册此课程时,您还会同时注册此专业证书。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 通过 IBM 获得可共享的职业证书

该课程共有6个模块

In this module, you will investigate the methods attackers use to gain initial access to a target system. Through hands-on labs, you’ll conduct active network reconnaissance with tools like Nmap and Netdiscover, create and deliver reverse shell payloads using msfvenom, and exploit vulnerabilities with the Metasploit Framework. You will verify successful exploitation and develop a deeper understanding of the tactics employed in the early stages of a cyberattack.

涵盖的内容

2个视频1篇阅读材料2个作业8个插件

In this module, you will learn how attackers escalate privileges after gaining initial access to a system. You’ll start by enumerating system vulnerabilities and identifying potential escalation paths. Using Metasploit's local exploit suggester, you will execute privilege escalation exploits and confirm root-level access on compromised systems.

涵盖的内容

1个视频2个作业4个插件

In this module, you will learn how attackers maintain long-term access to compromised systems by implementing persistence techniques. You’ll establish automated reverse shell connections and apply anti-forensic methods to avoid detection. By the end of the lab, you will have a clearer understanding of how attackers ensure continued access, even after reboots or defensive actions.

涵盖的内容

1个视频2个作业5个插件

In this module, you will assume the role of defender by detecting and analyzing signs of system compromise using widely used cybersecurity tools. You will run vulnerability scans with OpenVAS and perform log analysis to uncover Indicators of Compromise (IOCs). This module also introduces mapping findings to the MITRE ATT&CK framework to better understand attacker behavior and improve threat response.

涵盖的内容

2个作业5个插件

This module introduces learners to the emerging role of generative AI (GenAI) in cybersecurity. Learners will explore how GenAI tools can accelerate reconnaissance, automate exploit development, assist in social engineering, and enhance red team efficiency. On the defensive side, they will see how GenAI supports detection of anomalous behaviors, speeds up log analysis, and automates parts of the incident response process. Hands-on labs will provide exposure to both opportunities and risks of AI-driven hacking, while highlighting ethical and safe practices for AI use in cybersecurity.

涵盖的内容

2个视频2个作业9个插件

In this final stage of the capstone, you will consolidate all your work from the previous modules into a complete, professional-grade incident response package. You’ll learn how to clearly document technical findings, structure a detailed incident report, record Indicators of Compromise (IOCs), and recommend mitigation strategies. You will then package these deliverables—along with screenshots, scan results, and captured flags—into a single submission. This serves as both your final assessment and a demonstration of your ability to apply and communicate cybersecurity skills in a real-world context.

涵盖的内容

2个视频2篇阅读材料1个作业1个应用程序项目6个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

Christo Oehley
4 门课程10,713 名学生
IBM Skills Network Team
85 门课程1,671,046 名学生

提供方

IBM

从 Computer Security and Networks 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题