IBM
IBM Cybersecurity Analyst Professional Certificate
IBM

IBM Cybersecurity Analyst Professional Certificate

Launch your career as a cybersecurity analyst. Build job-ready skills for an in-demand role in the field, no degree or prior experience required.

IBM Skills Network Team
Dee Dee Collette
Jeff Crume

Instructors: IBM Skills Network Team

239,168 already enrolled

Included with Coursera Plus

Earn a career credential that demonstrates your expertise
4.7

(13,036 reviews)

Beginner level

Recommended experience

Flexible schedule
4 months, 10 hours a week
Learn at your own pace
Build toward a degree
Earn a career credential that demonstrates your expertise
4.7

(13,036 reviews)

Beginner level

Recommended experience

Flexible schedule
4 months, 10 hours a week
Learn at your own pace
Build toward a degree

What you'll learn

  • The job-ready skills you need to get an entry-level position as a cybersecurity analyst in just 4-6 months. 

  • Cybersecurity fundamentals and how to manage database vulnerabilities in operating systems administration and security. 

  • How to use cybersecurity tools and techniques to perform penetration testing, respond to incidents, and conduct forensics.

  • How to use generative AI to boost your productivity and effectiveness as a cybersecurity analyst.

Skills you'll gain

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English

Professional Certificate - 14 course series

What you'll learn

  • Compare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level.

  • Map IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity.

  • Identify the required certifications such as Security+, A+, CISSP, and CEH   for different job roles and the contents of each certification.

  • Discover the right role for you in cybersecurity and learn how to prepare for your chosen career path.

Skills you'll gain

Category: Cyber Attacks
Category: Endpoint Security
Category: Network Security
Category: Data Security
Category: Security Information and Event Management (SIEM)
Category: Cyber Security Strategy
Category: Threat Detection
Category: Cybersecurity
Category: Authentications
Category: Incident Response
Category: Identity and Access Management
Category: Security Controls
Category: Secure Coding
Category: Firewall
Category: Application Security
Category: Digital Network Architecture
Category: Authorization (Computing)
Category: Data Governance

What you'll learn

  • Recognize the importance of data security, maintaining data integrity, and confidentiality

  • Demonstrate the installation of software updates and patches

  • Identify preferred practices for authentication, encryption, and device security

  • Discuss types of security threats, breaches, malware, social engineering, and other attack vectors

Skills you'll gain

Category: Malware Protection
Category: Security Management
Category: Digital Forensics
Category: Cyber Attacks
Category: Network Security
Category: Email Security
Category: Threat Detection
Category: Vulnerability Management
Category: Computer Security Incident Management
Category: Cybersecurity
Category: Artificial Intelligence
Category: Incident Response
Category: Threat Modeling
Category: Security Awareness
Category: Vulnerability Assessments
Category: Penetration Testing
Category: Cybersecurity Case Study Analysis

What you'll learn

  • How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets

  • How to recognize various types of threat actors and malware and explore preventive measures

  • To identify various internet security threats and common cybersecurity best practices

  • To understand authentication and identity management concepts for safeguarding your organization

Skills you'll gain

Category: Malware Protection
Category: Cyber Attacks
Category: Network Security
Category: Threat Management
Category: Human Factors (Security)
Category: Threat Detection
Category: Multi-Factor Authentication
Category: Computer Security Incident Management
Category: Cybersecurity
Category: Cybersecurity Threats
Category: Incident Response
Category: Identity and Access Management
Category: Authentications
Category: Threat Modeling
Category: Security Awareness
Category: Security Controls
Category: Cybersecurity Controls
Category: Authorization (Computing)
Category: Distributed Denial-Of-Service (DDoS) Attacks
Category: Physical Threats and Controls

What you'll learn

  • Essential OS knowledge for professionals looking to get started in cybersecurity and IT support

  • How to adeptly navigate features unique to Windows, Linux, and MacOS ecosystems

  • How to manage user accounts and permissions

  • Valuable insights into foundational cloud computing concepts such as virtualization and containerization

Skills you'll gain

Category: Cyber Threat Intelligence
Category: Vulnerability Scanning
Category: Threat Detection
Category: Cryptography
Category: Cyber Threat Hunting
Category: Penetration Test
Category: Cybersecurity
Category: Artificial Intelligence
Category: Security Testing
Category: Encryption
Category: Application Security
Category: Vulnerability Assessments
Category: Code Review
Category: Penetration Testing

What you'll learn

  • Sought-after computer network and network security skills businesses need to protect the network and endpoint devices from unwanted intrusions.

  • How to apply organization policies to protect endpoint devices from attacks using firewall settings, and outbound and inbound rulesets.

  • Install, configure, apply patches and use cloud-based software to find, quarantine, and remove malware and for intrusion detection systems

  • Perform the tasks necessary to provide recommendations for network hardware devices, network security, and network monitoring and management

Skills you'll gain

Category: Security Management
Category: Technical Support and Services
Category: Network Security
Category: Information Technology
Category: Application Security
Category: CompTIA Certifications
Category: Cyber Security Strategy
Category: Computer Security Awareness Training
Category: ISC2 certifications
Category: Information Security (INFOSEC)
Category: Cybersecurity Careers
Category: Cybersecurity

What you'll learn

  • Job-ready data management skills employers need, including how to implement various data protection techniques to secure sensitive information

  • How to configure and manage database user profiles, password policies, privileges, and roles

  • How to identify, analyze, and mitigate database injection vulnerabilities, including OS commands and SQL injection

  • How to design and implement comprehensive database and application auditing models

Skills you'll gain

Category: Malware Protection
Category: Cyber Threat Intelligence
Category: Natural Language Processing
Category: Generative AI
Category: Security Information and Event Management (SIEM)
Category: Threat Detection
Category: Incident management, Security Information and Event Management (SIEM)
Category: Anomaly Detection
Category: Vulnerability Management
Category: Cybersecurity
Category: Artificial Intelligence
Category: Incident Response
Category: Incident Management
Category: Artificial Intelligence (AI)
Cybersecurity Architecture

Cybersecurity Architecture

Course 712 hours

What you'll learn

  • Describe the five foundational principles of cybersecurity and the Confidentiality, Integrity, and Availability (CIA) triad

  • Summarize the different areas that a cybersecurity architect must adopt to develop a secure enterprise solution

  • Discuss the different security domains, including IAM, endpoint security, network security, application security, and data security

  • Demonstrate your proficiency in recommending methods to improve network security in a given scenario

Skills you'll gain

Category: Cyber Threat Intelligence
Category: Intrusion Detection Systems
Category: Endpoint Security
Category: Network Routing
Category: Network Security
Category: Security Information and Event Management (SIEM)
Category: Endpoint Detection and Response
Category: Dynamic Host Configuration Protocol (DHCP)
Category: General Networking
Category: Wireless Networks
Category: Local Area Networks
Category: Computer Networking
Category: TCP/IP
Category: Network Architecture
Category: Cybersecurity
Category: Network Protocols
Category: Intrusion Detection and Prevention
Category: Network Configuration
Category: Data Loss Prevention
Category: Firewall
Category: Firewall Configuration
Category: Network Analysis
Category: Networking Hardware
Category: Network Planning And Design

What you'll learn

  • Define fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process.

  • Identify cybersecurity laws and regulations, both at a national and international level and comprehend their implications for organizations.

  • Explore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports.

  • Apply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.

Skills you'll gain

Category: Risk Management
Category: Cybersecurity Compliance
Category: Compliance Management
Category: Payment Card Industry (PCI) Data Security Standards
Category: Auditing
Category: IT Service Management
Category: Regulatory Compliance
Category: Cybersecurity Framework
Category: NIST 800-53
Category: Business Ethics
Category: Open Web Application Security Project (OWASP)
Category: Cybersecurity
Category: Artificial Intelligence
Category: Laws and Regulations
Category: Information Technology Infrastructure Library
Category: Control Objectives for Information and Related Technology (COBIT)
Category: General Data Protection Regulation (GDPR)
Category: Cybersecurity Standards
Category: Governance Risk Management and Compliance
Category: ISO/IEC 27001

What you'll learn

  • In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.

  • Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.

  • How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.

  • Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.

Skills you'll gain

Category: Command-Line Interface
Category: Cloud Security
Category: Virtualization
Category: User (Computing)
Category: Windows Servers
Category: File Systems
Category: Operating Systems
Category: Directory and File Management
Category: Systems Administration
Category: Mac OS
Category: Linux, Windows, MacOS
Category: Linux Servers
Category: User Accounts
Category: Security Controls
Category: Firewall
Category: Virtual Machines
Category: Linux
Category: Microsoft Windows
Category: Cloud Computing

What you'll learn

  • Explain the principles and importance of incident response in cybersecurity.

  • Implement techniques for detecting and analyzing security incidents.

  • Implement methods for collecting and examining digital data.

  • Analyze and report digital forensic findings to support cybersecurity efforts.

Skills you'll gain

Category: Security Testing
Category: Security Controls
Category: Certification exam practice
Category: Vulnerability Assessments
Category: CompTIA CySA
Category: Vulnerability Management
Category: Cyber Security Assessment
Category: CompTIA Security+
Category: Network Architecture
Category: Cybersecurity
Category: Incident Response

What you'll learn

  • Hands-on experience in analyzing cybersecurity case studies to identify threat tactics and assess vulnerabilities you can talk about in interviews

  • Demonstrable, practical skills for applying response frameworks and forensic techniques to real-world breach scenarios

  • Expertise in penetration testing and compliance analysis to evaluate organizational security regarding compliance successes and failures

  • Hands-on experience with researching real-world data breach scenarios and analyzing them to propose recommendations

Skills you'll gain

Category: Malware Protection
Category: Hardening
Category: Cyber Attacks
Category: Network Security
Category: Data Security
Category: Email Security
Category: Cryptography
Category: Multi-Factor Authentication
Category: Cybersecurity
Category: Authentications
Category: Identity and Access Management
Category: Information Systems Security
Category: Security Awareness
Category: Security Controls
Category: Encryption
Category: Application Security
Category: Authorization (Computing)
Category: Computer Security Awareness Training
Category: Information Security (INFOSEC)
Category: Cyberattacks

What you'll learn

  • Get CompTIA Security+ and CompTIA CySA+ exam-ready with study tips and rigorous exam-day preparation techniques

  • Validate your exam readiness with practice tests and timed mock exams

  • Ensure you’re familiar with the domains covered in each exam and how they are marked

  • Understand the certification process for each exam, including sign-up and testing procedures

Skills you'll gain

Category: Security Management
Category: Digital Forensics
Category: Security Information and Event Management (SIEM)
Category: Threat Detection
Category: Digital Evidence Handling
Category: Data Integrity
Category: Cyber Threat Hunting
Category: Cybersecurity
Category: Computer Security Incident Management
Category: Incident Response
Category: Intrusion Detection and Prevention
Category: Cybersecurity Incident Management
Category: Incident Management
Category: Security Analysis and Reporting

What you'll learn

  • Explain the fundamental concepts of Generative AI and its significance in cybersecurity.

  • Apply generative AI techniques to real-world cybersecurity scenarios, including UBEA, threat intelligence, report summarization, and playbooks.

  • Assess the use of generative AI in cybersecurity against threats, like phishing and malware, and understand potential NLP-based attack techniques.

  • Mitigate attacks on generative AI models and analyze real-world case studies, identifying key success factors in implementation.

Skills you'll gain

Category: Databases
Category: Vulnerability Scanning
Category: Data Security
Category: Database Security
Category: Data Integrity
Category: Database injection vulnerabilities
Category: Relational Databases
Category: Cybersecurity
Category: NoSQL
Category: SQL
Category: Database Design
Category: Password policies
Category: Database Management
Category: User profiles
Category: User Accounts
Category: Threat Modeling
Category: Encryption
Category: Application Security
Category: Role-Based Access Control (RBAC)
Category: Stored Procedure
Category: Database auditing models

What you'll learn

  • Explain cybersecurity roles, titles, responsibilities, and required skills and competencies, and explore the NICE framework

  • Create a resume, portfolio, elevator pitch, and cover letter and apply best practices to prepare for a cybersecurity job interview

  • Respond effectively to various cybersecurity interview questions, including industry, skills, experience, and behavioral

  • Discuss post-interview actions required to position yourself for success and apply tips to help during salary negotiation

Skills you'll gain

Category: Resume
Category: Business Research
Category: Interviewing Skills
Category: Professional Networking
Category: Branding
Category: Applicant Tracking Systems
Category: LinkedIn
Category: Market Research
Category: Presentations
Category: Cybersecurity
Category: Cybersecurity Careers
Category: job interviews
Category: Talent Recruitment
Category: Recruitment
Category: Writing
Category: Compensation Strategy
Category: Negotiation
Category: Company, Product, and Service Knowledge
Category: Portfolio Management
Category: Communication
Category: Social Media
Category: Job Search Strategies

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Build toward a degree

When you complete this Professional Certificate, you may be able to have your learning recognized for credit if you are admitted and enroll in one of the following online degree programs.¹

 

Instructors

IBM Skills Network Team
IBM
67 Courses1,237,120 learners
Dee Dee Collette
IBM
8 Courses589,487 learners
Jeff Crume
IBM
3 Courses8,233 learners

Offered by

IBM

Why people choose Coursera for their career

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

¹ Median salary and job opening data are sourced from Lightcast™ Job Postings Report. Content Creator, Machine Learning Engineer and Salesforce Development Representative (1/1/2024 - 12/31/2024) All other job roles (4/1/2024 - 4/1/2025)