Penetration Testing, Incident Response and Forensics

  • 4.6
Approx. 17 hours to complete

Course Summary

This course covers the fundamentals of penetration testing, incident response, and forensics. You will learn how to identify vulnerabilities, exploit them to gain access, and then respond to security incidents and conduct forensic investigations.

Key Learning Points

  • Learn how to perform penetration testing and vulnerability assessments
  • Understand incident response and how to handle security incidents
  • Gain skills in digital forensics and evidence collection

Related Topics for further study


Learning Outcomes

  • Perform penetration testing and vulnerability assessments
  • Handle security incidents and conduct forensic investigations
  • Identify vulnerabilities and exploit them to gain access

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of computer networks and operating systems
  • Familiarity with common security practices and tools

Course Difficulty Level

Intermediate

Course Format

  • Self-paced
  • Online
  • Video lectures
  • Hands-on exercises

Similar Courses

  • Offensive Security Certified Professional
  • SANS Penetration Testing

Related Education Paths


Notable People in This Field

  • Troy Hunt
  • Bruce Schneier

Related Books

Description

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program.

Outline

  • Penetration Testing
  • Introduction to Penetration Testing
  • What is Penetration Testing?
  • Penetration Testing - Planning
  • Penetration Testing - Discovery
  • Penetration Testing - Additional Discovery Details
  • Penetration Testing - Attack
  • Penetration Testing - Reporting
  • Tools
  • Penetration Testing - Planning resources
  • Discovery deeper dive
  • Hacking Techniques
  • Reporting Resources
  • Penetration Testing Tools Further Research
  • Planning and Discovery Knowledge Check
  • Attack and Reporting Knowledge Check
  • Penetration testing tools
  • Penetration Test Graded Quiz
  • Incident Response
  • Incident Response Overview
  • What is Incident Response?
  • Incident Response Preparation
  • Incident Response Detection & Analysis
  • Containment, Eradication & Recovery
  • Post Incident Activities
  • Incident Response Demo, Part 1
  • Incident Response Demo, Part 2
  • Incident Response Demo, Part 3
  • NIST vs Sans Institute
  • Importance of documentation
  • Automation
  • Case Study- Reviewing the IR Process
  • Apply your Knowledge from the Demo
  • Tools in Incident Response
  • Activity- IR Flow Chart
  • Incident Response Knowledge Check
  • Incident Response Graded Quiz
  • Digital Forensics
  • Module Overview
  • What are Forensics?
  • Data Collection & Examination
  • Analysis & Reporting
  • Data Files
  • Operating System Data
  • Application Data
  • Network Data
  • Handling Digital Evidence
  • Report Writing Example
  • F​orensics on Mobile Devices
  • Chances of Recovering Data
  • Beginner Digital Forensics Lab
  • Advanced Digital Forensics Lab Review
  • Forensic Course Overview Knowledge Check
  • The Forensics Process Knowledge Check
  • Forensic Data Knowledge Check
  • Digital Forensics Assessment
  • Introduction to Scripting
  • Module Overview
  • History of Scripting
  • Scripting Concepts
  • Scripting Languages
  • Python Basics
  • Python Getting Started
  • Data Structures
  • Functions and Methods
  • Python Libraries
  • Coding in cybersecurity
  • Scripts to Mitigate Risks
  • Bash Scripting in Penetration Testing
  • Lab Setup Instructions
  • Using Python in Forensics
  • Why learn Python?
  • Additional Python Training
  • Scripting Overview Knowledge Check
  • Python Scripting Knowledge Check
  • Introduction to Scripting Assessment

Summary of User Reviews

The IBM Penetration Testing, Incident Response and Forensics course on Coursera has received high praise from users. Many have found the course to be comprehensive and informative, with a focus on practical applications. Overall, users have rated the course highly.

Key Aspect Users Liked About This Course

The practical applications of the course have been praised by many users.

Pros from User Reviews

  • Comprehensive and informative content
  • Well-structured course with practical applications
  • Engaging and knowledgeable instructors
  • Good balance of theory and hands-on exercises
  • Useful resources and tools provided

Cons from User Reviews

  • Some users found the pace of the course to be too slow
  • Occasional technical issues with the online platform
  • Limited opportunities for interaction with instructors and peers
  • Not suitable for those with little to no prior knowledge of the subject
  • Some users felt that the assessments were too easy and did not accurately reflect the difficulty of the course
English
Available now
Approx. 17 hours to complete
IBM Security Learning Services
IBM
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses