IBM

IBM Cybersecurity Analyst Professional Certificate

IBM

IBM Cybersecurity Analyst Professional Certificate

Launch your career as a cybersecurity professional.

Build job-ready skills and prep for the CompTIA Security+ exam with this program.

Jeff Crume
IBM Skills Network Team
Dee Dee Collette

Instructors: Jeff Crume

Top Instructor

Access provided by FGSES: Université Mohammed VI Polytechnique

351,362 already enrolled

Earn a career credential that demonstrates your expertise

from 27,423 reviews of courses in this program

Beginner level

Recommended experience

4 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Earn a career credential that demonstrates your expertise

from 27,423 reviews of courses in this program

Beginner level

Recommended experience

4 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • The job-ready skills you need to get an entry-level position as a cybersecurity analyst in just 4-6 months. 

  • Cybersecurity fundamentals and how to manage database vulnerabilities in operating systems administration and security. 

  • How to use cybersecurity tools and techniques to perform penetration testing, respond to incidents, and conduct forensics.

  • How to use generative AI to boost your productivity and effectiveness as a cybersecurity analyst.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your career with in-demand skills

  • Receive professional-level training from IBM
  • Demonstrate your technical proficiency
  • Earn an employer-recognized certificate from IBM
$119,000+
median U.S. salary for Cybersecurity
¹
147,000+
U.S. job openings in Cybersecurity
¹

Professional Certificate - 14 course series

Introduction to Cybersecurity Careers

Introduction to Cybersecurity Careers

Course 1, 8 hours

What you'll learn

  • Compare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level.

  • Map IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity.

  • Identify the required certifications, such as Security+, A+, CISSP, and CEH, for different job roles and the contents of each certification.

  • Discover the right role for you in cybersecurity and learn how to prepare for your chosen career path.

Skills you'll gain

Category: Information Assurance
Category: Cybersecurity
Category: Data Security
Category: Vulnerability Assessments
Category: Network Security
Category: Operating Systems
Category: Computer Hardware
Category: Technical Support and Services
Category: Computer Security Awareness Training
Category: Cloud Security
Category: Information Technology
Category: Security Awareness
Category: Penetration Testing
Category: Incident Response
Category: Cyber Security Strategy
Category: Cyber Security Policies
Introduction to Cybersecurity Essentials

Introduction to Cybersecurity Essentials

Course 2, 13 hours

What you'll learn

  • Learn how to identify common cybersecurity threats, including malware, social engineering, breaches, and other attack vectors

  • Install software updates and patches, and apply authentication, encryption, and device-hardening techniques to protect sensitive information

  • Explore physical security, environmental safeguards, and access control measures used to prevent unauthorized access and ensure business continuity

  • Apply cybersecurity best practices using strong password creation and management strategies, and identify use cases for encryption

Skills you'll gain

Category: Personally Identifiable Information
Category: Malware Protection
Category: Data Security
Category: Multi-Factor Authentication
Category: Encryption
Category: Cyber Attacks
Category: Cybersecurity
Category: Application Security
Category: Hardening
Category: Endpoint Security
Category: Vulnerability Assessments
Category: Cryptography
Category: Authorization (Computing)
Category: Data Loss Prevention
Category: Data Integrity
Category: Security Controls
Category: Information Privacy
Category: Identity and Access Management
Category: Authentications
Category: Security Awareness
Introduction to Cybersecurity Tools & Cyberattacks

Introduction to Cybersecurity Tools & Cyberattacks

Course 3, 12 hours

What you'll learn

  • How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets

  • How to recognize various types of threat actors and malware and explore preventive measures

  • To identify various internet security threats and common cybersecurity best practices

  • To understand authentication and identity management concepts for safeguarding your organization

Skills you'll gain

Category: Multi-Factor Authentication
Category: Malware Protection
Category: Digital Forensics
Category: Identity and Access Management
Category: Distributed Denial-Of-Service (DDoS) Attacks
Category: Cyber Security Policies
Category: Incident Response
Category: Infrastructure Security
Category: Threat Management
Category: Computer Security Incident Management
Category: Human Factors (Security)
Category: Cybersecurity
Category: Security Controls
Category: Security Awareness
Category: Network Security
Category: Authentications
Category: Cyber Attacks

What you'll learn

  • Essential OS knowledge for professionals looking to get started in cybersecurity and IT support

  • How to adeptly navigate features unique to Windows, Linux, and MacOS ecosystems

  • How to manage user accounts and permissions

  • Valuable insights into foundational cloud computing concepts such as virtualization and containerization

Skills you'll gain

Category: Linux Administration
Category: File Systems
Category: Linux
Category: Systems Administration
Category: Cloud Computing
Category: Virtualization
Category: Linux Commands
Category: Command-Line Interface
Category: Microsoft Windows
Category: Mac OS
Category: Virtual Machines
Category: Operating Systems
Category: Windows Servers
Category: Knowledge of Apple Software
Category: Cloud Security
Category: Cloud Computing Architecture
Category: File Management
Category: User Accounts
Category: Operating System Administration
Category: Firewall
Computer Networks and Network Security

Computer Networks and Network Security

Course 5, 15 hours

What you'll learn

  • Sought-after computer network and network security skills businesses need to protect the network and endpoint devices from unwanted intrusions.

  • How to apply organization policies to protect endpoint devices from attacks using firewall settings, and outbound and inbound rulesets.

  • Install, configure, apply patches and use cloud-based software to find, quarantine, and remove malware and for intrusion detection systems

  • Perform the tasks necessary to provide recommendations for network hardware devices, network security, and network monitoring and management

Skills you'll gain

Category: Network Protocols
Category: Firewall
Category: Network Security
Category: Network Routing
Category: Intrusion Detection and Prevention
Category: Endpoint Detection and Response
Category: Networking Hardware
Category: Network Routers
Category: General Networking
Category: Network Infrastructure
Category: Local Area Networks
Category: Dynamic Host Configuration Protocol (DHCP)
Category: TCP/IP
Category: Data Loss Prevention
Category: Endpoint Security
Category: Routing Protocols
Category: Network Administration
Category: Network Architecture
Category: Cyber Threat Intelligence
Category: Cybersecurity
Database Essentials and Vulnerabilities

Database Essentials and Vulnerabilities

Course 6, 15 hours

What you'll learn

  • Job-ready data management skills employers need, including how to implement various data protection techniques to secure sensitive information

  • How to configure and manage database user profiles, password policies, privileges, and roles

  • How to identify, analyze, and mitigate database injection vulnerabilities, including OS commands and SQL injection

  • How to design and implement comprehensive database and application auditing models

Skills you'll gain

Category: Data Security
Category: Encryption
Category: Database Management
Category: SQL
Category: Application Security
Category: Relational Databases
Category: NoSQL
Category: User Provisioning
Category: Security Controls
Category: Role-Based Access Control (RBAC)
Category: Databases
Category: User Accounts
Category: Database Design
Category: Database Application
Category: Information Systems Security
Category: Database Management Systems
Category: Database Architecture and Administration
Category: Database Administration
Category: Vulnerability Management
Cybersecurity Architecture

Cybersecurity Architecture

Course 7, 14 hours

What you'll learn

  • Apply the five foundational principles of cybersecurity and CIA triad to real-world scenarios to design and evaluate secure systems

  • Integrate key areas a cybersecurity architect must consider when developing a secure enterprise solution, including governance, and risk management

  • Assess and implement Identity and Access Management (IAM), endpoint security, application security, and data security, to strengthen security

  • Evaluate scenarios & recommend practical methods to enhance its security through improved configurations, monitoring, and incident response planning

Skills you'll gain

Category: Application Security
Category: Data Security
Category: Network Security
Category: Endpoint Detection and Response
Category: Cybersecurity
Category: Information Technology Architecture
Category: IT Security Architecture
Category: Network Architecture

What you'll learn

  • Define fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process.

  • Identify cybersecurity laws and regulations, both at a national and international level and comprehend their implications for organizations.

  • Explore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports.

  • Apply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.

Skills you'll gain

Category: Regulatory Compliance
Category: Risk Management
Category: Governance Risk Management and Compliance
Category: Responsible AI
Category: Information Technology Infrastructure Library
Category: Law, Regulation, and Compliance
Category: IT Service Management
Category: Compliance Auditing
Category: Information Technology
Category: Compliance Management
Category: Cyber Security Assessment
Category: Auditing
Category: Cyber Governance
Category: Cyber Risk
Category: IT Management
Category: ISO/IEC 27001
Category: Data Ethics
Category: Service Management
Category: Cybersecurity
Category: Regulation and Legal Compliance
Penetration Testing, Threat Hunting, and Cryptography

Penetration Testing, Threat Hunting, and Cryptography

Course 9, 18 hours

What you'll learn

  • In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.

  • Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.

  • How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.

  • Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.

Skills you'll gain

Category: Penetration Testing
Category: Cryptography
Category: Cyber Threat Hunting
Category: Cyber Threat Intelligence
Category: Exploitation techniques
Category: MITRE ATT&CK Framework
Category: Vulnerability Assessments
Category: Encryption
Category: Security Testing
Category: Vulnerability Scanning
Category: Brute-force attacks
Category: AI Integrations
Category: Threat Detection
Category: Cybersecurity
Category: Application Security
Category: Test Planning
Incident Response and Digital Forensics

Incident Response and Digital Forensics

Course 10, 6 hours

What you'll learn

  • Explain the principles and importance of incident response in cybersecurity.

  • Implement techniques for detecting and analyzing security incidents.

  • Implement methods for collecting and examining digital data.

  • Analyze and report digital forensic findings to support cybersecurity efforts.

Skills you'll gain

Category: Incident Response
Category: Computer Security Incident Management
Category: Digital Forensics
Category: Cybersecurity
Category: Security Management
Category: Incident Management
Category: Threat Detection
Category: Data Integrity
Category: Cyber Threat Intelligence
Cybersecurity Case Studies and Capstone Project

Cybersecurity Case Studies and Capstone Project

Course 11, 17 hours

What you'll learn

  • Hands-on experience in analyzing cybersecurity case studies to identify threat tactics and assess vulnerabilities you can talk about in interviews

  • Demonstrable, practical skills for applying response frameworks and forensic techniques to real-world breach scenarios

  • Expertise in penetration testing and compliance analysis to evaluate organizational security regarding compliance successes and failures

  • Hands-on experience with researching real-world data breach scenarios and analyzing them to propose recommendations

Skills you'll gain

Category: Incident Response
Category: Digital Forensics
Category: Penetration Testing
Category: Malware Protection
Category: Cyber Security Assessment
Category: Vulnerability Assessments
Category: Exploitation techniques
Category: AI Security
Category: Security Awareness
Category: Network Security
Category: Threat Detection
Category: Computer Security Incident Management
Category: Cybersecurity
Cybersecurity Assessment: CompTIA Security+ & CYSA+

Cybersecurity Assessment: CompTIA Security+ & CYSA+

Course 12, 8 hours

What you'll learn

  • Get CompTIA Security+ and CompTIA CySA+ exam-ready with study tips and rigorous exam-day preparation techniques

  • Validate your exam readiness with practice tests and timed mock exams

  • Ensure you’re familiar with the domains covered in each exam and how they are marked

  • Understand the certification process for each exam, including sign-up and testing procedures

Skills you'll gain

Category: Incident Response
Category: Cyber Security Assessment
Category: Vulnerability Management
Category: Simulations
Category: Cybersecurity
Category: Scenario Testing
Category: Security Controls
Category: Security Testing
Generative AI: Boost Your Cybersecurity Career

Generative AI: Boost Your Cybersecurity Career

Course 13, 10 hours

What you'll learn

  • Explain the fundamental concepts of Generative AI and its significance in cybersecurity.

  • Apply generative AI techniques to real-world cybersecurity scenarios, including UBEA, threat intelligence, report summarization, and playbooks.

  • Assess the use of generative AI in cybersecurity against threats, like phishing and malware, and understand potential NLP-based attack techniques.

  • Mitigate attacks on generative AI models and analyze real-world case studies, identifying key success factors in implementation.

Skills you'll gain

Category: Generative AI
Category: Anomaly Detection
Category: Threat Modeling
Category: Cyber Threat Intelligence
Category: AI Security
Category: Incident Response
Category: Vulnerability Management
Category: Generative Model Architectures
Category: Security Information and Event Management (SIEM)
Category: Large Language Modeling
Category: Cybersecurity
Category: Incident Management
Category: Prompt Engineering
Category: Threat Detection
Category: Malware Protection
Category: Exploitation techniques
Cybersecurity Job Search, Resume, and Interview Prep

Cybersecurity Job Search, Resume, and Interview Prep

Course 14, 11 hours

What you'll learn

  • Explain cybersecurity roles, titles, responsibilities, and required skills and competencies, and explore the NICE framework

  • Create a resume, portfolio, elevator pitch, and cover letter and apply best practices to prepare for a cybersecurity job interview

  • Respond effectively to various cybersecurity interview questions, including industry, skills, experience, and behavioral

  • Discuss post-interview actions required to position yourself for success and apply tips to help during salary negotiation

Skills you'll gain

Category: Interviewing Skills
Category: Professional Networking
Category: Job Analysis
Category: Negotiation
Category: Applicant Tracking Systems
Category: Keyword Research
Category: Web Presence
Category: Cybersecurity
Category: Market Research
Category: Communication
Category: Technical Communication
Category: Business Writing
Category: Recruitment
Category: Writing
Category: Portfolio Management

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Build toward a degree

When you complete this Professional Certificate, you may be able to have your learning recognized for credit if you are admitted and enroll in one of the following online degree programs.¹

ACE Logo

This Professional Certificate has ACE® recommendation. It is eligible for college credit at participating U.S. colleges and universities. Note: The decision to accept specific credit recommendations is up to each institution. 

Instructors

IBM Skills Network Team
92 Courses1,978,826 learners
Dee Dee Collette
IBM
11 Courses731,302 learners
Jeff Crume

Top Instructor

IBM
3 Courses20,809 learners

Offered by

IBM

Why people choose Coursera for their career

¹Lightcast™ Job Postings Report, United States, 7/1/22-6/30/23. ²Based on program graduate survey responses, United States 2021.