IBM
Ethical Hacking Capstone Project: Breach, Response, AI
IBM

Ethical Hacking Capstone Project: Breach, Response, AI

Christo Oehley
IBM Skills Network Team

Instructors: Christo Oehley

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Advanced level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Advanced level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Demonstrate your hands-on ethical hacking expertise uncovering, remediating system vulnerabilities and leveraging AI to enhance cybersecurity skills

  • Gain practical experience in reconnaissance and exploitation using advanced penetration testing tools like Metasploit

  • Apply privilege escalation and persistence techniques to simulate real-world attacker strategies in security assessments

  • Strengthen defensive skills by detecting threats with OpenVAS, analyzing system logs, and documenting incidents with the MITRE ATT&CK framework

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

October 2025

Assessments

11 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 6 modules in this course

In this module, you will investigate the methods attackers use to gain initial access to a target system. Through hands-on labs, you’ll conduct active network reconnaissance with tools like Nmap and Netdiscover, create and deliver reverse shell payloads using msfvenom, and exploit vulnerabilities with the Metasploit Framework. You will verify successful exploitation and develop a deeper understanding of the tactics employed in the early stages of a cyberattack.

What's included

2 videos1 reading2 assignments8 plugins

In this module, you will learn how attackers escalate privileges after gaining initial access to a system. You’ll start by enumerating system vulnerabilities and identifying potential escalation paths. Using Metasploit's local exploit suggester, you will execute privilege escalation exploits and confirm root-level access on compromised systems.

What's included

1 video2 assignments4 plugins

In this module, you will learn how attackers maintain long-term access to compromised systems by implementing persistence techniques. You’ll establish automated reverse shell connections and apply anti-forensic methods to avoid detection. By the end of the lab, you will have a clearer understanding of how attackers ensure continued access, even after reboots or defensive actions.

What's included

1 video2 assignments5 plugins

In this module, you will assume the role of defender by detecting and analyzing signs of system compromise using widely used cybersecurity tools. You will run vulnerability scans with OpenVAS and perform log analysis to uncover Indicators of Compromise (IOCs). This module also introduces mapping findings to the MITRE ATT&CK framework to better understand attacker behavior and improve threat response.

What's included

2 assignments5 plugins

This module introduces learners to the emerging role of generative AI (GenAI) in cybersecurity. Learners will explore how GenAI tools can accelerate reconnaissance, automate exploit development, assist in social engineering, and enhance red team efficiency. On the defensive side, they will see how GenAI supports detection of anomalous behaviors, speeds up log analysis, and automates parts of the incident response process. Hands-on labs will provide exposure to both opportunities and risks of AI-driven hacking, while highlighting ethical and safe practices for AI use in cybersecurity.

What's included

2 videos2 assignments9 plugins

In this final stage of the capstone, you will consolidate all your work from the previous modules into a complete, professional-grade incident response package. You’ll learn how to clearly document technical findings, structure a detailed incident report, record Indicators of Compromise (IOCs), and recommend mitigation strategies. You will then package these deliverables—along with screenshots, scan results, and captured flags—into a single submission. This serves as both your final assessment and a demonstration of your ability to apply and communicate cybersecurity skills in a real-world context.

What's included

2 videos2 readings1 assignment1 app item6 plugins

Instructors

Christo Oehley
4 Courses7,685 learners
IBM Skills Network Team
IBM
83 Courses1,557,223 learners

Offered by

IBM

Explore more from Computer Security and Networks

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions