Chevron Left
返回到 Penetration Testing, Threat Hunting, and Cryptography

学生对 IBM 提供的 Penetration Testing, Threat Hunting, and Cryptography 的评价和反馈

4.6
2,490 个评分

课程概述

The cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture. During the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into threat intelligence. Plus, you’ll learn to leverage Cyber Threat Intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods. To complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity. This course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course. If you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume....

热门审阅

ES

Aug 22, 2020

Very thorough topical information at the entry level that leaves you with confidence and knowledge afterwards. I am very thankful for this course and the whole IBM Cyber Pro Cert.

PV

Jul 6, 2020

you need to improve the way of explanation because it is hard to understand while you explaining the topics and another horrible thing is Rahul explanation because his voice is not audible

筛选依据:

351 - Penetration Testing, Threat Hunting, and Cryptography 的 375 个评论(共 544 个)

创建者 KiberKod

Mar 22, 2022

Good

创建者 Lim S

Feb 21, 2022

good

创建者 Mohammed S

Jun 9, 2021

good

创建者 Jauharul M

May 26, 2021

Good

创建者 Bussetty S S

Apr 3, 2021

GOOD

创建者 Ajay b

Jan 22, 2021

good

创建者 Tong V C

Jan 4, 2021

Good

创建者 Neha S

Jul 7, 2020

good

创建者 Chathura S

Jul 3, 2020

good

创建者 MD. A A M

Jun 13, 2020

Nice

创建者 Leonel O

Jul 13, 2023

T_T

创建者 Deleted A

May 5, 2023

yes

创建者 نوال س م ز

Mar 3, 2023

جيد

创建者 TAMRAH M A A T M A A

Feb 22, 2023

100

创建者 Faisal L

Jan 18, 2023

yes

创建者 SALMA R D A S R D A

Mar 24, 2023

ok

创建者 Ryan N

Mar 7, 2023

ok

创建者 Abdul R A D

Sep 4, 2022

NA

创建者 Aikynuly B

Mar 7, 2025

1

创建者 Айдын А

Sep 29, 2024

5

创建者 Bunyodbek G

Apr 25, 2024

m

创建者 Michelle E

Jul 3, 2022

创建者 Okunade D A

Jun 6, 2022

E

创建者 BAYTÖRE İ

May 10, 2023

I must say the program was challenging, especially considering my English proficiency. However, with patience, hard work and determination, I successfully completed the program. I would like to point out that there are some complex issues that require repetition and revision to fully grasp. However, I am grateful for the opportunity to receive such a quality education and look forward to applying my newly acquired knowledge and skills in my future endeavors. Thank you again for this valuable experience.

创建者 Berfan H

Oct 6, 2021

Cons: The lecturer isn't really "teaching" you, he's mostly reading the slides, uses advanced language and complicated words, and so isn't really giving you tools to tell what you learned.

Pros: Packed with information. And because the lecturer is reading the material, you can just take down notes using slides and skip the parts where the lecturer is reading the slides and save some time.