EB
Mar 6, 2023
after knowing the basic knowledge with high standards applied and taught in detail by IBM, so understanding can be achieved. This section is very useful when entering the world of cybersecurity work.
T
Oct 14, 2022
The course has really helped me learn lots of things conserning penetration testing and digital forensiscs and also bash scripting. All credits to IBM for their humbleness in teachng very well .
By Effat E
鈥Mar 29, 2021
What I liked most about this course in comparison to others is the added video of the presenter next to the slides content. This helped me focus and absorb the content better.
By lai y
鈥Mar 28, 2021
I learn something , if got some written assessment is much better for learners to test the knowledges and the key takeaways
By Michael M
鈥Oct 8, 2020
I ABSOLUTELY Enjoyed learning about Mostly Forensics. Like out of all it caught my attention! I'd do it again if I can!
By Jose N N
鈥Mar 25, 2023
Amazing course again. Learned so much and I love the Python basics!
By Merryl A
鈥Jun 26, 2021
Its not as good as per IBM standards as it was just one person reading sentences from the slides.
Python and scripting was interesting though.
By Olumide E O
鈥Oct 22, 2021
It's okay. But it could have been much better. I expected more becuase of the quality standard set by earlier courses in the specialization.
By B
鈥Jan 20, 2023
Too theory based and not enough practical application. There are some good external resources for learning pentesting skills and seeing how IBM's QRadar works, but the entire Python section needs to be entirely reworked, from the voice recordings all the way to the content and, at the very least, add resources that show practical application of Python for cybersecurity.
By Jason L
鈥Mar 20, 2021
The course does not accurately display the amount of time required to complete this week; do expect twice the amount stated, as there is lab work.
By Joseph L
鈥Aug 11, 2020
The presenter in the videos was boring and just read the script. There were many grammatical errors in the questions. I believe there to be factual errors in the questions. Finally, the content seemed arbitrary, like the final week quiz was just basic python and CS history. All in all, a very poor offering from IBM and I would be ashamed to have my company logo on this course product.
By Jonathan V C
鈥Apr 2, 2021
Of all the certification courses I wanted to reach this one to learn, practically, how to do penetration testing, but again all this certification it's only theory. A short video mentioning that Kali Linux got all you need for penetration testing and nothing else, everyone interested on penetration testing knows that, thank you. Completly dissapointed.
By Willem V
鈥Feb 16, 2022
Some of the Audio is the worst I have ever heard. I have to print out the lecture just to understand what was said. 糖心vlog官网观看 should investigate this, and get IBM to provide proper lectures. Im very disappointed with 糖心vlog官网观看.
By Afraa W
鈥Feb 5, 2022
I can't get certificate just because coursera can't recognize my id. Please have a look at this issue. It is very saddening as well as disappointing
By Francesco B
鈥Jun 13, 2024
As an Engineering student interested in cybersecurity, I enrolled in the "Penetration Testing, Incident Response, and Forensics" course with high expectations, and I must say it exceeded them in several aspects. This course is structured to provide a comprehensive understanding of three crucial domains within cybersecurity: penetration testing, incident response, and digital forensics. It starts with a solid foundation in penetration testing techniques, covering both ethical hacking methodologies and practical exercises to simulate real-world scenarios. The hands-on labs were particularly valuable, allowing us to apply theoretical knowledge to actual systems and networks, thereby honing our skills in identifying vulnerabilities and exploiting them responsibly. Moving into incident response, the course delved into the strategies and protocols necessary to detect, analyze, and mitigate cybersecurity incidents effectively. This section emphasized the importance of preparation and rapid response, which are critical in minimizing damage and recovering from attacks swiftly. The digital forensics segment provided a deep dive into investigative techniques used to gather and analyze digital evidence. From file system analysis to memory forensics, the course equipped us with the tools and methodologies essential for conducting thorough investigations, whether for legal proceedings or internal incident reviews. One of the standout features of the course was its integration of industry best practices and real-world case studies. Learning from actual breaches and successful penetration testing engagements brought a practical dimension to the theoretical concepts covered in lectures. Moreover, the instructors were highly knowledgeable and experienced, providing valuable insights and guidance throughout the course. The course concluded with a comprehensive project that challenged us to apply all three domains鈥攑enetration testing, incident response, and forensics鈥攚ithin a simulated cyber attack scenario. This project not only tested our technical skills but also our ability to think critically under pressure, mimicking the demands of cybersecurity professionals in the field. Overall, "Penetration Testing, Incident Response, and Forensics" proved to be an enriching and rewarding experience. It provided me with a solid foundation in key cybersecurity domains and equipped me with practical skills that are directly applicable in today's threat landscape. I would highly recommend this course to anyone looking to pursue a career in cybersecurity or deepen their understanding of offensive and defensive security strategies.
By Augustine S
鈥Sep 14, 2024
This course offers a comprehensive introduction to the core aspects of cybersecurity, covering three essential pillars: Penetration Testing, Incident Response, and Digital Forensics. Each area is critical for protecting and investigating security breaches in IT infrastructures. 1. Penetration Testing Penetration testing (pentesting) focuses on proactive security by simulating cyberattacks to identify vulnerabilities before they can be exploited by malicious actors. The course thoroughly explains the methodologies used by ethical hackers to uncover weaknesses in systems, networks, and applications. Key Highlights: Understanding the penetration testing lifecycle, including reconnaissance, scanning, exploitation, and post-exploitation. Introduction to widely used tools such as Metasploit, Nmap, and Burp Suite. Practical scenarios where learners get to conduct vulnerability assessments and security tests on real-world systems. Emphasis on ethical hacking, compliance with legal regulations, and responsible disclosure practices. 2. Incident Response The Incident Response (IR) section emphasizes the reactive side of cybersecurity, focusing on how organizations detect, contain, and recover from security breaches. The course outlines best practices for responding to cyberattacks and minimizing damage. Key Highlights: Incident response lifecycle: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, and Post-Incident Activities. Detailed coverage of how to prepare an incident response plan (IRP), including team roles, communication, and tools. Insights into threat intelligence, triage, containment strategies, and evidence preservation. Practical steps for post-incident analysis, such as lessons learned and improving future responses. 3. Digital Forensics The forensics module dives into the investigative side of cybersecurity, focusing on how to gather and analyze evidence from digital systems to identify the nature and scope of an attack. This area is crucial for both legal prosecution and improving future security measures. Key Highlights: Explanation of how digital forensics supports criminal investigations, internal audits, and incident response. Techniques for collecting, preserving, and analyzing evidence in a way that maintains its integrity, such as chain of custody. Introduction to forensic tools like EnCase, FTK, and Autopsy. Focus on file systems, network forensics, and memory forensics. Importance of documentation, reporting, and presenting forensic findings in legal contexts.
By Val猫re K
鈥Jan 16, 2025
Bien le bonjour 脿 mes pairs, Je tiens 脿 remercier chaleureusement les professeurs DeeDee Colette, Jeff Crume, Manish Kumar, Rav Ahuja, ainsi que toute l'茅quipe p茅dagogique d'IBM, pour les cours de la sp茅cialisation "IBM Cybersecurity Analyst Certificate". Cette formation a 茅t茅 extr锚mement enrichissante et m'a permis d'acqu茅rir des connaissances solides et pr茅cieuses en mati猫re de s茅curit茅 des actifs num茅riques, qui constituent une base r茅elle pour une carri猫re lumineuse dans le domaine. Je souhaite souligner la qualit茅 des diff茅rents quiz not茅s et non-not茅s, les laboratoires pratiques, qui se sont r茅v茅l茅s tr猫s utiles pour appliquer concr猫tement les notions apprises. Toutefois, je me permets de proposer une am茅lioration : introduire une nouvelle variation des questions et des r茅ponses 脿 chaque tentative. Cela rendrait l'exercice encore plus engageant et favoriserait une meilleure ma卯trise des concepts. Enfin, je sugg猫re l'ajout d'un cours de synth猫se, un "Put it all together", qui permettrait de relier les diff茅rents concepts et outils enseign茅s. Une telle initiative offrirait une vision globale unifi茅e de la cybers茅curit茅 (ce que vous avez fait 茅tant d茅j脿 assez exceptionnel) et surtout du poste en lui-m锚me, ce qui serait particuli猫rement b茅n茅fique pour les apprenants. Merci encore pour cette excellente formation et pour votre d茅vouement 脿 transmettre des connaissances de grande valeur ! Val猫re Firmin KAMBO TAMBA
By Keith S
鈥Oct 17, 2022
This course was set up for success. Easy to follow instructing. Videos were really well put together. Seeing how I am a note take I loved the fact that the videos had transcripts. I could take notes as I read them and then watch the videos to see it in action.
I learned a lot and found out other areas to explore with the tools that were mentioned in all of the videos.
I will be taking more classes like this one.
By Mikey S
鈥Jan 31, 2022
This course was great, the level of difficulty is good. I need to go back and review some things. The one thing that needs to be updated are the links to the Advanced Digital Forensics lab and the link to the virtual environment for the Beginning Digital Forensics lab. The Python lab doesn't work either, I will try the instructions again.
Great course and I love hands-on things like going through the QRadar lab.
By Cleiton C
鈥Dec 6, 2022
Nota Agradecimento Curso
馃挒 I LOVE IBM , the courses and opportunities you offer. You don't know me, know that IBM courses and training platforms have the same life. Today I am successful and I am happy.!!! 馃弳
I am immensely GRATEFUL to IBM and the team of Devs who are behind these educational works and projects. 馃挐鉁煡佛煈煉烩湇锔
Thank's!!!
Cleiton Corr锚a- Senior Engineer Software -
Bauru/S茫o Paulo - Brasil
By nouf
鈥Aug 10, 2020
It was a great introductory course on really interesting and important topics, gave us quite enough on each and every one of them. The course doesn't require deep knowledge in cybersecurity and depends a lot on self learning! I loved the resources that the course included from labs to articles to tools, they were all so helpful and great to explore!
By Kevin E M J
鈥Sep 14, 2022
I am in school for my BS in CyberSecurity with a focus on Intelligence and Forensic Studies. This course pushed me, and will make me better at my job. This course will ultimately help me to better analyze and detect problems faster, and by doing that I will be able to save companies, or my government millions of dollars in the long run.
By Cassian R
鈥May 1, 2023
The Course is an excellent opportunity for a beginner to commence the Cybersecurity ecosystem and the resources are abundant, relevant and direct the user in the right direction. The quiz have been created to make it challenging and interesting to complete them. It is a totally immersive course. Thank you 糖心vlog官网观看.
By Mohamed A H O
鈥Jul 26, 2021
I really appreciate the great effort of 糖心vlog官网观看 and IBM for this course, it is really a great experience learning this course. This course gives all the knowledge required to start career in Cyber Security domain with all the concepts and other documentations attached. Very much Helpful. Thank you so much..
By Jimmy M A
鈥Dec 4, 2021
The more I learn the more I feel there is to learn. These courses are amazing! I want to become the best analyst I can and I realize this will be a challenge. The information provided in the course along with the links to other sites is a treasure chest of information.
By Sergio H A
鈥Jan 29, 2023
I like very much this course because is plenty of new items to me, I think is complete and have many resources that can be consulted and get additional knowledge. The laboratories were amazing and easy to realize.
Congratulations to instructors sen my bes regards!
By Alexandre d S S
鈥Oct 14, 2024
Gostaria de expressar minha gratid茫o pelo excelente curso "Penetration Testing, Incident Response and Forensics" oferecido pela IBM. Esta experi锚ncia tem sido fundamental para o meu desenvolvimento profissional e pessoal na 谩rea de ciberseguran莽a.