IBM
IBM Cybersecurity Analyst Professional Certificate
IBM

IBM Cybersecurity Analyst Professional Certificate

Get ready to launch your career in cybersecurity. Build job-ready skills for an in-demand role in the field, no degree or prior experience required.

IBM Skills Network Team
Dee Dee Collette
Dr. Manish Kumar

Instructors: IBM Skills Network Team

Access provided by Alef

265,017 already enrolled

Earn a career credential that demonstrates your expertise
4.7

(13,596 reviews)

Beginner level

Recommended experience

Flexible schedule
4 months at 10 hours a week
Learn at your own pace
Build toward a degree
Earn a career credential that demonstrates your expertise
4.7

(13,596 reviews)

Beginner level

Recommended experience

Flexible schedule
4 months at 10 hours a week
Learn at your own pace
Build toward a degree

What you'll learn

  • Develop knowledge of cybersecurity analyst tools including data protection; endpoint protection; SIEM; and systems and network fundamentals.

  • Learn about key compliance and threat intelligence topics important in today’s cybersecurity landscape.

  • Gain skills for incident responses and forensics with real-world cybersecurity case studies.

  • Get hands-on experience to develop skills via industry specific and open source Security tools.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Prepare for a career in Cybersecurity

  • Receive professional-level training from IBM
  • Demonstrate your proficiency in portfolio-ready projects
  • Earn an employer-recognized certificate from IBM
  • Qualify for in-demand job titles: Junior Cybersecurity Analyst, Cybersecurity Analyst
$119,000+
median U.S. salary for Cybersecurity
¹
147,000+
U.S. job openings in Cybersecurity
¹

Professional Certificate - 8 course series

What you'll learn

  • How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets

  • How to recognize various types of threat actors and malware and explore preventive measures

  • To identify various internet security threats and common cybersecurity best practices

  • To understand authentication and identity management concepts for safeguarding your organization

Skills you'll gain

Category: Cybersecurity
Category: Multi-Factor Authentication
Category: Identity and Access Management
Category: Malware Protection
Category: Distributed Denial-Of-Service (DDoS) Attacks
Category: Network Security
Category: Security Awareness
Category: Authentications
Category: Incident Response
Category: Human Factors (Security)
Category: Security Controls
Category: Cyber Attacks
Category: Threat Detection
Category: Computer Security Incident Management

What you'll learn

  • Essential OS knowledge for professionals looking to get started in cybersecurity and IT support

  • How to adeptly navigate features unique to Windows, Linux, and MacOS ecosystems

  • How to manage user accounts and permissions

  • Valuable insights into foundational cloud computing concepts such as virtualization and containerization

Skills you'll gain

Category: File Systems
Category: Virtualization
Category: Mac OS
Category: Command-Line Interface
Category: Cloud Computing
Category: Linux Commands
Category: Active Directory
Category: Linux Administration
Category: Operating System Administration
Category: Computer Systems
Category: Operating Systems
Category: Firewall
Category: Windows PowerShell
Category: Containerization
Category: User Accounts
Category: Cloud Security
Category: Windows Servers
Category: Linux Servers
Category: System Software
Category: Virtual Machines

What you'll learn

  • Define fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process.

  • Identify cybersecurity laws and regulations, both at a national and international level and comprehend their implications for organizations.

  • Explore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports.

  • Apply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.

Skills you'll gain

Category: Risk Management
Category: NIST 800-53
Category: Governance Risk Management and Compliance
Category: General Data Protection Regulation (GDPR)
Category: Open Web Application Security Project (OWASP)
Category: Control Objectives for Information and Related Technology (COBIT)
Category: IT Service Management
Category: Regulatory Compliance
Category: Information Technology Infrastructure Library
Category: Payment Card Industry (PCI) Data Security Standards
Category: Artificial Intelligence
Category: Compliance Management
Category: Security Controls
Category: Data Ethics
Category: ISO/IEC 27001
Category: Information Technology
Category: Cybersecurity
Category: Auditing

What you'll learn

  • Sought-after computer network and network security skills businesses need to protect the network and endpoint devices from unwanted intrusions.

  • How to apply organization policies to protect endpoint devices from attacks using firewall settings, and outbound and inbound rulesets.

  • Install, configure, apply patches and use cloud-based software to find, quarantine, and remove malware and for intrusion detection systems

  • Perform the tasks necessary to provide recommendations for network hardware devices, network security, and network monitoring and management

Skills you'll gain

Category: Network Protocols
Category: Network Security
Category: Network Routing
Category: Endpoint Detection and Response
Category: Intrusion Detection and Prevention
Category: Networking Hardware
Category: Information Systems Security
Category: Data Loss Prevention
Category: Wireless Networks
Category: Network Planning And Design
Category: Network Infrastructure
Category: Network Analysis
Category: General Networking
Category: TCP/IP
Category: Endpoint Security
Category: Firewall
Category: Security Information and Event Management (SIEM)
Category: Dynamic Host Configuration Protocol (DHCP)
Category: Cybersecurity
Category: Local Area Networks

What you'll learn

  • In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.

  • Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.

  • How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.

  • Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.

Skills you'll gain

Category: Penetration Testing
Category: Cyber Threat Hunting
Category: Exploitation techniques
Category: MITRE ATT&CK Framework
Category: Cyber Threat Intelligence
Category: Encryption
Category: Cryptography
Category: Threat Modeling
Category: Application Security
Category: Cybersecurity
Category: Open Web Application Security Project (OWASP)
Category: Security Testing
Category: Vulnerability Assessments
Category: Vulnerability Scanning
Category: Test Planning
Category: Threat Detection

What you'll learn

  • Explain the principles and importance of incident response in cybersecurity.

  • Implement techniques for detecting and analyzing security incidents.

  • Implement methods for collecting and examining digital data.

  • Analyze and report digital forensic findings to support cybersecurity efforts.

Skills you'll gain

Category: Incident Response
Category: Technical Communication
Category: Computer Security Incident Management
Category: Threat Detection
Category: Incident Management
Category: Security Management
Category: Cybersecurity
Category: Cyber Threat Hunting
Category: Intrusion Detection and Prevention
Category: Data Integrity
Category: Security Information and Event Management (SIEM)

What you'll learn

  • Hands-on experience in analyzing cybersecurity case studies to identify threat tactics and assess vulnerabilities you can talk about in interviews

  • Demonstrable, practical skills for applying response frameworks and forensic techniques to real-world breach scenarios

  • Expertise in penetration testing and compliance analysis to evaluate organizational security regarding compliance successes and failures

  • Hands-on experience with researching real-world data breach scenarios and analyzing them to propose recommendations

Skills you'll gain

Category: Incident Response
Category: Cybersecurity
Category: Penetration Testing
Category: Data Security
Category: Distributed Denial-Of-Service (DDoS) Attacks
Category: Malware Protection
Category: Vulnerability Assessments
Category: Cyber Threat Intelligence
Category: Threat Detection
Category: Security Awareness
Category: Fraud detection
Category: Network Security
Category: Artificial Intelligence
Category: Threat Modeling
Category: Email Security
Category: Computer Security Incident Management
Category: Exploitation techniques

What you'll learn

  • Get CompTIA Security+ and CompTIA CySA+ exam-ready with study tips and rigorous exam-day preparation techniques

  • Validate your exam readiness with practice tests and timed mock exams

  • Ensure you’re familiar with the domains covered in each exam and how they are marked

  • Understand the certification process for each exam, including sign-up and testing procedures

Skills you'll gain

Category: Incident Response
Category: Network Architecture
Category: Cyber Security Assessment
Category: Vulnerability Management
Category: Cybersecurity
Category: Cyber Risk
Category: Security Testing

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Build toward a degree

When you complete this Professional Certificate, you may be able to have your learning recognized for credit if you are admitted and enroll in one of the following online degree programs.¹

 
ACE Logo

This Professional Certificate has ACE® recommendation. It is eligible for college credit at participating U.S. colleges and universities. Note: The decision to accept specific credit recommendations is up to each institution. 

Instructors

IBM Skills Network Team
84 Courses1,601,992 learners
Dee Dee Collette
IBM
11 Courses646,343 learners
Dr. Manish Kumar
IBM
8 Courses191,720 learners

Offered by

IBM

Why people choose Coursera for their career

¹Lightcast™ Job Postings Report, United States, 7/1/22-6/30/23. ²Based on program graduate survey responses, United States 2021.