IBM

IBM Cybersecurity Analyst Professional Certificate

IBM

IBM Cybersecurity Analyst Professional Certificate

Launch your career as a cybersecurity professional. Build job-ready skills and prep for the CompTIA Security+ exam with this program.

Jeff Crume
IBM Skills Network Team
Dee Dee Collette

Instructors: Jeff Crume

Top Instructor

Access provided by ExxonMobil

277,132 already enrolled

Earn a career credential that demonstrates your expertise

from 27,239 reviews of courses in this program

Beginner level

Recommended experience

Flexible schedule
4 months at 10 hours a week
Learn at your own pace
Build toward a degree
Earn a career credential that demonstrates your expertise

from 27,239 reviews of courses in this program

Beginner level

Recommended experience

Flexible schedule
4 months at 10 hours a week
Learn at your own pace
Build toward a degree

What you'll learn

  • The job-ready skills you need to get an entry-level position as a cybersecurity analyst in just 4-6 months. 

  • Cybersecurity fundamentals and how to manage database vulnerabilities in operating systems administration and security. 

  • How to use cybersecurity tools and techniques to perform penetration testing, respond to incidents, and conduct forensics.

  • How to use generative AI to boost your productivity and effectiveness as a cybersecurity analyst.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your career with in-demand skills

  • Receive professional-level training from IBM
  • Demonstrate your technical proficiency
  • Earn an employer-recognized certificate from IBM
$119,000+
median U.S. salary for Cybersecurity
¹
147,000+
U.S. job openings in Cybersecurity
¹

Professional Certificate - 14 course series

What you'll learn

  • Compare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level.

  • Map IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity.

  • Identify the required certifications, such as Security+, A+, CISSP, and CEH, for different job roles and the contents of each certification.

  • Discover the right role for you in cybersecurity and learn how to prepare for your chosen career path.

Skills you'll gain

Category: Cybersecurity
Category: Data Security
Category: Information Assurance
Category: Information Technology
Category: General Networking
Category: ISO/IEC 27001
Category: Information Systems Security Assessment Framework (ISSAF)
Category: Technical Support and Services
Category: Application Security
Category: Computer Hardware
Category: Cyber Security Strategy
Category: Technical Support
Category: Security Awareness
Category: Computer Security Awareness Training
Category: Cyber Security Policies
Category: Network Security

What you'll learn

  • Learn how to identify common cybersecurity threats, including malware, social engineering, breaches, and other attack vectors

  • Install software updates and patches, and apply authentication, encryption, and device-hardening techniques to protect sensitive information

  • Explore physical security, environmental safeguards, and access control measures used to prevent unauthorized access and ensure business continuity

  • Apply cybersecurity best practices using strong password creation and management strategies, and identify use cases for encryption

Skills you'll gain

Category: Personally Identifiable Information
Category: Multi-Factor Authentication
Category: Malware Protection
Category: Encryption
Category: Cyber Attacks
Category: Data Security
Category: Computer Security Awareness Training
Category: Cryptography
Category: Data Integrity
Category: Security Controls
Category: Hardening
Category: Email Security
Category: Security Awareness
Category: Vulnerability Assessments
Category: Authentications
Category: Identity and Access Management
Category: Authorization (Computing)
Category: Information Privacy
Category: Application Security
Category: Cybersecurity

What you'll learn

  • How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets

  • How to recognize various types of threat actors and malware and explore preventive measures

  • To identify various internet security threats and common cybersecurity best practices

  • To understand authentication and identity management concepts for safeguarding your organization

Skills you'll gain

Category: Multi-Factor Authentication
Category: Cybersecurity
Category: Identity and Access Management
Category: Malware Protection
Category: Digital Forensics
Category: Threat Detection
Category: Infrastructure Security
Category: Cyber Attacks
Category: Authentications
Category: Security Controls
Category: Network Security
Category: Security Awareness
Category: Incident Response
Category: Human Factors (Security)

What you'll learn

  • Essential OS knowledge for professionals looking to get started in cybersecurity and IT support

  • How to adeptly navigate features unique to Windows, Linux, and MacOS ecosystems

  • How to manage user accounts and permissions

  • Valuable insights into foundational cloud computing concepts such as virtualization and containerization

Skills you'll gain

Category: File Systems
Category: Active Directory
Category: Virtualization
Category: Mac OS
Category: Linux Administration
Category: Linux Commands
Category: Command-Line Interface
Category: User Accounts
Category: Cloud Computing
Category: Containerization
Category: Linux Servers
Category: Firewall
Category: Windows PowerShell
Category: Windows Servers
Category: Cloud Security
Category: System Software
Category: Operating Systems
Category: Operating System Administration
Category: Virtual Machines
Category: Computer Systems

What you'll learn

  • Sought-after computer network and network security skills businesses need to protect the network and endpoint devices from unwanted intrusions.

  • How to apply organization policies to protect endpoint devices from attacks using firewall settings, and outbound and inbound rulesets.

  • Install, configure, apply patches and use cloud-based software to find, quarantine, and remove malware and for intrusion detection systems

  • Perform the tasks necessary to provide recommendations for network hardware devices, network security, and network monitoring and management

Skills you'll gain

Category: Network Security
Category: Network Protocols
Category: Networking Hardware
Category: Network Routing
Category: Endpoint Detection and Response
Category: Intrusion Detection and Prevention
Category: TCP/IP
Category: Firewall
Category: Local Area Networks
Category: Network Analysis
Category: Cybersecurity
Category: Data Loss Prevention
Category: Endpoint Security
Category: Network Infrastructure
Category: Wireless Networks
Category: Network Planning And Design
Category: Information Systems Security
Category: General Networking
Category: Security Information and Event Management (SIEM)
Category: Dynamic Host Configuration Protocol (DHCP)

What you'll learn

  • Job-ready data management skills employers need, including how to implement various data protection techniques to secure sensitive information

  • How to configure and manage database user profiles, password policies, privileges, and roles

  • How to identify, analyze, and mitigate database injection vulnerabilities, including OS commands and SQL injection

  • How to design and implement comprehensive database and application auditing models

Skills you'll gain

Category: SQL
Category: Database Management
Category: Encryption
Category: Data Security
Category: NoSQL
Category: Secure Coding
Category: Relational Databases
Category: Application Security
Category: Database Architecture and Administration
Category: Role-Based Access Control (RBAC)
Category: User Accounts
Category: Databases
Category: Vulnerability Scanning
Category: Data Manipulation
Cybersecurity Architecture

Cybersecurity Architecture

Course 7 14 hours

What you'll learn

  • Apply the five foundational principles of cybersecurity and CIA triad to real-world scenarios to design and evaluate secure systems

  • Integrate key areas a cybersecurity architect must consider when developing a secure enterprise solution, including governance, and risk management

  • Assess and implement Identity and Access Management (IAM), endpoint security, application security, and data security, to strengthen security

  • Evaluate scenarios & recommend practical methods to enhance its security through improved configurations, monitoring, and incident response planning

Skills you'll gain

Category: Application Security
Category: Data Security
Category: Network Security
Category: Cybersecurity
Category: Information Technology Architecture

What you'll learn

  • Define fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process.

  • Identify cybersecurity laws and regulations, both at a national and international level and comprehend their implications for organizations.

  • Explore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports.

  • Apply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.

Skills you'll gain

Category: Risk Management
Category: NIST 800-53
Category: Information Technology Infrastructure Library
Category: IT Service Management
Category: Control Objectives for Information and Related Technology (COBIT)
Category: Payment Card Industry (PCI) Data Security Standards
Category: Regulatory Compliance
Category: Responsible AI
Category: Governance Risk Management and Compliance
Category: Open Web Application Security Project (OWASP)
Category: General Data Protection Regulation (GDPR)
Category: Information Technology
Category: Security Controls
Category: ISO/IEC 27001
Category: Auditing
Category: Artificial Intelligence
Category: Cybersecurity
Category: Compliance Management

What you'll learn

  • In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.

  • Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.

  • How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.

  • Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.

Skills you'll gain

Category: Penetration Testing
Category: Encryption
Category: Cryptography
Category: Cyber Threat Intelligence
Category: Security Testing
Category: Cyber Threat Hunting
Category: Vulnerability Assessments
Category: Exploitation techniques
Category: MITRE ATT&CK Framework
Category: Vulnerability Scanning
Category: AI Security
Category: Threat Detection
Category: Cybersecurity
Category: Threat Modeling
Category: Test Planning
Category: Application Security

What you'll learn

  • Explain the principles and importance of incident response in cybersecurity.

  • Implement techniques for detecting and analyzing security incidents.

  • Implement methods for collecting and examining digital data.

  • Analyze and report digital forensic findings to support cybersecurity efforts.

Skills you'll gain

Category: Digital Forensics
Category: Incident Response
Category: Security Management
Category: Data Integrity
Category: Security Controls
Category: Network Monitoring
Category: Computer Security Incident Management
Category: Event Monitoring
Category: Intrusion Detection and Prevention
Category: Cyber Threat Hunting
Category: Threat Detection
Category: Endpoint Detection and Response
Category: Cybersecurity

What you'll learn

  • Hands-on experience in analyzing cybersecurity case studies to identify threat tactics and assess vulnerabilities you can talk about in interviews

  • Demonstrable, practical skills for applying response frameworks and forensic techniques to real-world breach scenarios

  • Expertise in penetration testing and compliance analysis to evaluate organizational security regarding compliance successes and failures

  • Hands-on experience with researching real-world data breach scenarios and analyzing them to propose recommendations

Skills you'll gain

Category: Incident Response
Category: Digital Forensics
Category: AI Security
Category: Penetration Testing
Category: Cybersecurity
Category: Cyber Security Assessment
Category: Threat Detection
Category: Vulnerability Assessments
Category: Fraud detection
Category: Payment Card Industry (PCI) Data Security Standards
Category: Computer Security Incident Management
Category: Cyber Threat Intelligence
Category: Security Management
Category: Exploitation techniques
Category: Threat Modeling
Category: Email Security
Category: Malware Protection
Category: Network Security

What you'll learn

  • Get CompTIA Security+ and CompTIA CySA+ exam-ready with study tips and rigorous exam-day preparation techniques

  • Validate your exam readiness with practice tests and timed mock exams

  • Ensure you’re familiar with the domains covered in each exam and how they are marked

  • Understand the certification process for each exam, including sign-up and testing procedures

Skills you'll gain

Category: Cyber Security Assessment
Category: Test Planning
Category: Cybersecurity
Category: Security Testing

What you'll learn

  • Explain the fundamental concepts of Generative AI and its significance in cybersecurity.

  • Apply generative AI techniques to real-world cybersecurity scenarios, including UBEA, threat intelligence, report summarization, and playbooks.

  • Assess the use of generative AI in cybersecurity against threats, like phishing and malware, and understand potential NLP-based attack techniques.

  • Mitigate attacks on generative AI models and analyze real-world case studies, identifying key success factors in implementation.

Skills you'll gain

Category: Generative AI
Category: Anomaly Detection
Category: Security Information and Event Management (SIEM)
Category: Threat Modeling
Category: Cyber Threat Intelligence
Category: Incident Response
Category: Vulnerability Management
Category: AI Security
Category: Threat Detection
Category: Prompt Engineering
Category: Artificial Intelligence
Category: Malware Protection
Category: Cybersecurity

What you'll learn

  • Explain cybersecurity roles, titles, responsibilities, and required skills and competencies, and explore the NICE framework

  • Create a resume, portfolio, elevator pitch, and cover letter and apply best practices to prepare for a cybersecurity job interview

  • Respond effectively to various cybersecurity interview questions, including industry, skills, experience, and behavioral

  • Discuss post-interview actions required to position yourself for success and apply tips to help during salary negotiation

Skills you'll gain

Category: Interviewing Skills
Category: Professional Networking
Category: Negotiation
Category: Cybersecurity
Category: Technical Communication
Category: Social Media
Category: Market Research
Category: LinkedIn
Category: Writing
Category: Communication
Category: Recruitment
Category: Portfolio Management
Category: Presentations

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Build toward a degree

When you complete this Professional Certificate, you may be able to have your learning recognized for credit if you are admitted and enroll in one of the following online degree programs.¹

 
ACE Logo

This Professional Certificate has ACE® recommendation. It is eligible for college credit at participating U.S. colleges and universities. Note: The decision to accept specific credit recommendations is up to each institution. 

Instructors

IBM Skills Network Team
91 Courses 1,796,947 learners
Dee Dee Collette
IBM
11 Courses 713,033 learners
Jeff Crume

Top Instructor

IBM
3 Courses 18,132 learners

Offered by

IBM

Why people choose Coursera for their career

¹Lightcast™ Job Postings Report, United States, 7/1/22-6/30/23. ²Based on program graduate survey responses, United States 2021.