Information security jobs are projected to grow 32% by 2032 (US Bureau of Labor Statistics). With ethical hacking now a key component of an effective cybersecurity strategy, skilled ethical hackers are in high demand! This program gives you the job-ready skills using key tools successful ethical hackers use in just 2 months.
Ethical hacking is authorized testing of computer systems to find security weaknesses before attackers can exploit them. Ethical hackers run penetration tests, assess vulnerabilities, and recommend fixes to help protect organizations from cyber threats.
This program builds your knowledge and hands-on experience of popular open source cybersecurity tools: Kali Linux, Wireshark, Metasploit, and OpenVAS. You’ll explore ethical and legal fundamentals and then look at each tool's capabilities to build comprehensive skills for identifying, analyzing, and tackling security vulnerabilities.Â
Guided by IBM's cybersecurity experts, you’ll learn to conduct controlled penetration tests, analyze network traffic for suspicious activity, execute ethical exploitation techniques, and implement effective incident response strategies. Plus, you’ll complete real-world hands-on labs and projects you can add to your portfolio to showcase your skills to potential employers.Â
If you’re looking to skill up using key ethical hacking tools to become an Ethical Hacker, Penetration Tester, Security Analyst, or Incident Responder, enroll today!
Applied Learning Project
Throughout the program, you’ll build valuable hands-on experience in practical labs projects that simulate real-world cybersecurity scenarios. Perfect for your portfolio and great for showcasing your experience in interviews.
Key projects include:
Conducting comprehensive ethical assessments while documenting legal compliance considerations
Installing, configuring, and using Kali Linux to perform controlled penetration tests on virtual environments
Capturing and analyzing network traffic with Wireshark to identify security vulnerabilities and suspicious activities
Executing controlled exploits using Metasploit framework in isolated lab environments
Implementing vulnerability scanning with OpenVAS and developing incident response plans
Each project helps you to build a comprehensive skillset across the cybersecurity toolkit. Plus, you'll create professional reports documenting your findings and recommendations, a critical skill for ethical hackers in the workplace.