When you enroll in this course, you'll also be asked to select a specific program.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 5 modules in this course
According to a recent IBM report, cyberattacks have surged 71%! This alarming statistic highlights a huge demand for cybersecurity professionals. This IBM course will introduce you to fundamental cybersecurity concepts, threats, and preventive measures to start your cybersecurity journey.
In this course, you’ll explore the evolution of cybersecurity and discover the critical thinking model. You’ll also cover threat actors, malware, ransomware, and defenses against social engineering.
Additionally, you’ll learn about internet security threats and security controls. You’ll explore the fundamentals of identity and access management (IAM), authentication, and access control. You’ll also look at the physical threats organizations encounter and consider effective security measures.
Throughout, you’ll build practical knowledge through hands-on labs and gain technical expertise through insights from industry experts. Your final project will enable you to effectively demonstrate your understanding of cybersecurity principles.
This course is for anyone who wants a basic understanding of cybersecurity and is part of a series designed to help you start a career as a Cybersecurity Analyst.
In this module, you'll receive a concise overview detailing the history of cybersecurity, along with insights into key events that influenced the global approach to cybersecurity. You’ll learn about critical thinking, its significance, and how it applies in real-world scenarios within cybersecurity. Additionally, you’ll gain a clear understanding of the five key elements of the critical thinking model. Finally, you will delve into the five critical thinking skills that help form the foundation of critical thinking in every professional field, including cybersecurity.
What's included
7 videos5 readings3 assignments
Show info about module content
7 videos•Total 46 minutes
Course Introduction•4 minutes
The Impact of the WarGames Movie on Cybersecurity •5 minutes
The Impact of 9/11 on Cybersecurity •7 minutes
The Impact of COVID-19 on Cybersecurity •6 minutes
In this module, you will discover various threat actors and their motivations, and explore the trends highlighted in the latest IBM Security X-Force Threat Intelligence Index. You will also explore emerging trends in cybersecurity. Additionally, you will study malware and ransomware tactics, along with strategies to protect your system against them. The module will also introduce social engineering and its applications by cybercriminals. Finally, you will identify essential tips to safeguard your system against phishing, vishing, and smishing attempts.
What's included
8 videos7 readings4 assignments1 app item1 plugin
Show info about module content
8 videos•Total 61 minutes
Types of Actors and Their Motives•7 minutes
Cybersecurity Trends•5 minutes
What is Malware? Let's Hear the Hacker's Viewpoint•5 minutes
What is Ransomware? •4 minutes
How to Prevent Malware Attacks•6 minutes
Social Engineering - How Bad Guys Hack Users•15 minutes
What is Phishing?•8 minutes
Humans vs. AI Who's Better at Phishing?•11 minutes
[Optional] Hands-on Lab: Malware Scan Using Rkhunter•20 minutes
1 plugin•Total 30 minutes
Activity: Explore the IBM X-Force Threat Intelligence Index•30 minutes
Cybersecurity Controls
Module 3•3 hours to complete
Module details
In this module, you will learn about a range of internet security threats, including network mapping, packet sniffing, ID spoofing, denial-of-service (DoS) attacks, and injection attacks. You'll also gain insights into system, network, and application security, and engage in practical exercises to implement security controls. Furthermore, you'll delve into vulnerability assessment, incident response, and digital forensics.
What's included
11 videos3 readings3 assignments1 plugin
Show info about module content
11 videos•Total 77 minutes
Internet Security Threats: Mapping•6 minutes
Internet Security Threats: Packet Sniffing•7 minutes
Internet Security Threats: IP Spoofing•6 minutes
Internet Security Threats: Denial-of-Service Attacks•10 minutes
Internet Security Threats: Injection Attacks•8 minutes
In this module, you will learn about identity and access management (IAM) and its four main categories. You will explore various authentication protocols and methods to verify an individual's identity and gain a clear understanding of different access control schemes. Additionally, you will compare traditional and innovative access control methods and explore multifactor authentication, single sign-on, and passkeys. Finally, you will learn about various threats that can impact an organization's cybersecurity and identify different security measures for deterring them.
What's included
8 videos3 readings3 assignments2 plugins
Show info about module content
8 videos•Total 50 minutes
Identity and Access Management (IAM)•3 minutes
Authentication •6 minutes
Authorization•5 minutes
Access Controls •7 minutes
What is Multifactor Authentication?•3 minutes
What is Single Sign-On (SSO)?•6 minutes
Passkeys FIDO•11 minutes
Physical Threats and Controls•8 minutes
3 readings•Total 22 minutes
Physical Cybersecurity Controls•10 minutes
Module 4 Summary: Identity and Physical Controls•2 minutes
Module 4 Glossary: Identity and Physical Controls•10 minutes
3 assignments•Total 50 minutes
Practice Quiz: Authentication and Access Control•10 minutes
Practice Quiz: Physical Threats and Controls •10 minutes
Module 4 Graded Quiz: Identity and Physical Controls•30 minutes
In this module, you will complete a final project on multifactor authentication that will provide you with an opportunity to apply the knowledge and skills acquired in this course. You will also take a graded exam to evaluate your understanding of various cybersecurity tools and attacks.
What's included
1 video3 readings1 app item
Show info about module content
1 video•Total 4 minutes
Course Wrap-up•4 minutes
3 readings•Total 12 minutes
Final Project Overview: Secure Access•10 minutes
Congratulations and Next Steps•1 minute
Thanks from the Course Team•1 minute
1 app item•Total 30 minutes
Final Project Submission: Secure Access•30 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructors
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
At IBM, we know how rapidly tech evolves and recognize the crucial need for businesses and professionals to build job-ready, hands-on skills quickly. As a market-leading tech innovator, we’re committed to helping you thrive in this dynamic landscape. Through IBM Skills Network, our expertly designed training programs in AI, software development, cybersecurity, data science, business management, and more, provide the essential skills you need to secure your first job, advance your career, or drive business success. Whether you’re upskilling yourself or your team, our courses, Specializations, and Professional Certificates build the technical expertise that ensures you, and your organization, excel in a competitive world.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.6
16,530 reviews
5 stars
70.45%
4 stars
20.98%
3 stars
5.11%
2 stars
1.64%
1 star
1.80%
Showing 3 of 16530
E
EM
5·
Reviewed on Aug 6, 2025
This course enhanced my knowledge in cybersecurity and explained the fundamental concepts in a simple way. The practical examples and real-life case studies made the learning experience more engaging.
F
FS
4·
Reviewed on Apr 9, 2020
Some video issues (audio problems, spelling issues, editing), the background web app is not particularly good at "handing off" lessons and you will repeat MANY videos, most weblinks are 404 errors.
E
ET
5·
Reviewed on Jun 1, 2022
Instructive and educational. Great and fulfilling course on Cybersecurity Tools and Cyber Attacks! Awesome course fullfils its objectives of providing the needed tools amd skills in Cyber attacks.
You will receive an email notification from Credly Acclaim with instructions for claiming the badge. Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.