Penetration Testing, Threat Hunting, and Cryptography

This course is part of multiple programs. Learn more

Instructors: Dr. Manish Kumar +2 more

Instructor ratings

We asked all learners to give feedback on our instructors based on the quality of their teaching style.

What you'll learn

  •   In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.
  •   Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.
  •   How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.
  •   Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.
  • Skills you'll gain

  •   Vulnerability Assessments
  •   Cyber Threat Hunting
  •   Network Analysis
  •   Threat Modeling
  •   Threat Detection
  •   Code Review
  •   Vulnerability Scanning
  •   MITRE ATT&CK Framework
  •   Application Security
  •   Threat Management
  •   Cryptography
  •   Security Information and Event Management (SIEM)
  •   Cyber Threat Intelligence
  •   Cyber Operations
  •   Penetration Testing
  •   Data Integrity
  •   Encryption
  •   Security Testing
  •   Test Planning
  •   Open Web Application Security Project (OWASP)
  • There are 6 modules in this course

    During the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into threat intelligence. Plus, you’ll learn to leverage Cyber Threat Intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods. To complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity. This course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course. If you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume.

    Penetration Testing: Attack Phase

    Penetration Testing: Reporting Phase

    Threat Hunting and Threat Intelligence

    Cryptography: Principles and Techniques

    Final Project and Wrap-Up

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved