IBM
IBM Cybersecurity Analyst Professional Certificate
IBM

IBM Cybersecurity Analyst Professional Certificate

Launch your career as a cybersecurity analyst . Build job-ready skills for an in-demand role in the field, no degree or prior experience required.

IBM Skills Network Team
Dee Dee Collette
Jeff Crume

Instructors: IBM Skills Network Team

Sponsored by InternMart, Inc

214,543 already enrolled

Earn a career credential that demonstrates your expertise
4.6

(12,181 reviews)

Beginner level

Recommended experience

Flexible schedule
4 months, 10 hours a week
Learn at your own pace
Build toward a degree
Earn a career credential that demonstrates your expertise
4.6

(12,181 reviews)

Beginner level

Recommended experience

Flexible schedule
4 months, 10 hours a week
Learn at your own pace
Build toward a degree

What you'll learn

  • The job-ready skills you need to get an entry-level position as a cybersecurity analyst in just 4-6 months. 

  • Cybersecurity fundamentals and how to manage database vulnerabilities in operating systems administration and security. 

  • How to use cybersecurity tools and techniques to perform penetration testing, respond to incidents, and conduct forensics.

  • How to use generative AI to boost your productivity and effectiveness as a cybersecurity analyst.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

August 2024

See how employees at top companies are mastering in-demand skills

Placeholder

Advance your career with in-demand skills

  • Receive professional-level training from IBM
  • Demonstrate your technical proficiency
  • Earn an employer-recognized certificate from IBM
Placeholder
$119,000+
median U.S. salary for Cybersecurity
¹
147,000+
U.S. job openings in Cybersecurity
¹
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

Professional Certificate - 14 course series

Introduction to Cybersecurity Careers

Course 17 hours4.7 (305 ratings)

What you'll learn

  • Compare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level.

  • Map IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity.

  • Identify the required certifications such as Security+, A+, CISSP, and CEH   for different job roles and the contents of each certification.

  • Discover the right role for you in cybersecurity and learn how to prepare for your chosen career path.

Skills you'll gain

Category: Network Security
Category: Cybersecurity

Introduction to Cybersecurity Essentials

Course 212 hours4.8 (630 ratings)

What you'll learn

  • Recognize the importance of data security, maintaining data integrity, and confidentiality

  • Demonstrate the installation of software updates and patches

  • Identify preferred practices for authentication, encryption, and device security

  • Discuss types of security threats, breaches, malware, social engineering, and other attack vectors

Skills you'll gain

Category: Cybersecurity
Category: Network Security
Category: Security Strategy
Category: Security Management
Category: Security Controls
Category: Security Engineering
Category: Computer Security Awareness Training
Category: Security Software
Category: Application Security
Category: IT Security Architecture
Category: Enterprise Security
Category: Encryption
Category: Cyber Security Strategy
Category: Threat Management
Category: Cryptography
Category: Data Security
Category: Data Governance
Category: Security Awareness
Category: Data Strategy
Category: Information Privacy
Category: Vulnerability Management
Category: Cyber Security Policies
Category: Safety and Security
Category: Authorization (Computing)
Category: Cyber Governance
Category: Data Management
Category: Information Systems Security
Category: Authentications
Category: Infrastructure Security
Category: Threat Detection
Category: Hardening
Category: Identity and Access Management
Category: Email Security
Category: Information Assurance
Category: Computer Security
Category: Cyber Attacks
Category: Multi-Factor Authentication

Introduction to Cybersecurity Tools & Cyberattacks

Course 311 hours4.6 (15,640 ratings)

What you'll learn

  • How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets

  • How to recognize various types of threat actors and malware and explore preventive measures

  • To identify various internet security threats and common cybersecurity best practices

  • To understand authentication and identity management concepts for safeguarding your organization

Skills you'll gain

Category: Cybersecurity
Category: Network Security
Category: Cyber Attacks
Category: Security Management
Category: Identity and Access Management
Category: Security Controls
Category: Security Strategy
Category: Security Awareness
Category: Incident Management
Category: Authentications
Category: Application Security
Category: Threat Detection
Category: Critical Thinking and Problem Solving
Category: Problem Solving
Category: Computer Security
Category: Threat Management
Category: Secure Coding
Category: Safety and Security
Category: Incident Response
Category: Critical Thinking
Category: Computer Security Incident Management
Category: IT Security Architecture
Category: Cyber Threat Hunting
Category: Security Software
Category: Multi-Factor Authentication
Category: Cyber Threat Intelligence
Category: Malware Protection
Category: Analytical Skills
Category: Security Engineering
Category: Vulnerability Management

Operating Systems: Overview, Administration, and Security

Course 417 hours4.6 (5,481 ratings)

What you'll learn

  • Essential OS knowledge for professionals looking to get started in cybersecurity and IT support

  • How to adeptly navigate features unique to Windows, Linux, and MacOS ecosystems

  • How to manage user accounts and permissions

  • Valuable insights into foundational cloud computing concepts such as virtualization and containerization

Skills you'll gain

Category: Operating Systems
Category: Computing Platforms
Category: Microsoft Servers
Category: Windows Servers
Category: Microsoft Windows
Category: Command-Line Interface
Category: Linux Administration
Category: IT Infrastructure
Category: Linux Commands
Category: Mac OS
Category: Unix Shell
Category: Unix
Category: Linux
Category: Document Control
Category: Software Systems
Category: Cloud Computing
Category: Computer Networking
Category: Computer Science
Category: Identity and Access Management
Category: Databases
Category: IT Management
Category: Systems Architecture
Category: Systems Administration
Category: Cybersecurity
Category: File Systems
Category: Data Management
Category: Information Technology
Category: Record Keeping
Category: Network Administration
Category: General Networking
Category: Network Security
Category: Computer Systems
Category: Server Administration
Category: Network Infrastructure
Category: System Software
Category: Document Management
Category: Data Storage
Category: Cloud Computing Architecture
Category: Information Technology Operations
Category: Cloud Solutions
Category: File Management
Category: Infrastructure Architecture
Category: Cloud Infrastructure
Category: System Programming
Category: Active Directory
Category: Virtualization and Virtual Machines
Category: Records Management

Computer Networks and Network Security

Course 514 hours4.7 (3,163 ratings)

What you'll learn

  • Sought-after computer network and network security skills businesses need to protect the network and endpoint devices from unwanted intrusions.

  • How to apply organization policies to protect endpoint devices from attacks using firewall settings, and outbound and inbound rulesets.

  • Install, configure, apply patches and use cloud-based software to find, quarantine, and remove malware and for intrusion detection systems

  • Perform the tasks necessary to provide recommendations for network hardware devices, network security, and network monitoring and management

Skills you'll gain

Category: General Networking
Category: Firewall
Category: SQL
Category: Database Architecture and Administration
Category: Network Architecture
Category: Network Infrastructure
Category: Incident Management
Category: Computer Networking
Category: Network Security
Category: Relational Databases
Category: Query Languages
Category: Network Protocols
Category: Databases
Category: Network Planning And Design
Category: IT Security Architecture
Category: Security Engineering
Category: Enterprise Security
Category: Network Administration
Category: Database Management Systems
Category: Information Technology
Category: Threat Management
Category: Cybersecurity
Category: Infrastructure Security
Category: Database Development
Category: NoSQL
Category: Data Security
Category: Computer Hardware
Category: Database Theory
Category: IT Infrastructure
Category: Information Systems Security
Category: Operational Databases
Category: Vulnerability
Category: TCP/IP
Category: Database Systems
Category: Endpoint Detection and Response
Category: Endpoint Security
Category: Intrusion Detection and Prevention
Category: Data Storage
Category: Dynamic Host Configuration Protocol (DHCP)
Category: OSI Models
Category: Database Management
Category: Data Management
Category: Computer Security Incident Management
Category: Information Technology Architecture
Category: Data Infrastructure
Category: Routing Protocols
Category: Threat Detection
Category: Network Engineering
Category: Networking Hardware
Category: Data Architecture
Category: Data Store
Category: Network Routing

What you'll learn

  • Job-ready data management skills employers need, including how to implement various data protection techniques to secure sensitive information

  • How to configure and manage database user profiles, password policies, privileges, and roles

  • How to identify, analyze, and mitigate database injection vulnerabilities, including OS commands and SQL injection

  • How to design and implement comprehensive database and application auditing models

Skills you'll gain

Category: Database Management Systems
Category: Database Systems
Category: Database Development
Category: Database Management
Category: Database Theory
Category: Databases
Category: Information Systems Security
Category: Database Architecture and Administration
Category: Database Administration
Category: Query Languages
Category: Vulnerability
Category: Cybersecurity
Category: Data Management
Category: Data Security
Category: Penetration Testing
Category: Relational Databases
Category: Security Testing
Category: Enterprise Security
Category: Cyber Security Assessment
Category: Application Security
Category: Vulnerability Assessments
Category: SQL
Category: MySQL

Cybersecurity Architecture

Course 712 hours4.9 (49 ratings)

What you'll learn

  • Describe the five foundational principles of cybersecurity and the Confidentiality, Integrity, and Availability (CIA) triad

  • Summarize the different areas that a cybersecurity architect must adopt to develop a secure enterprise solution

  • Discuss the different security domains, including IAM, endpoint security, network security, application security, and data security

  • Demonstrate your proficiency in recommending methods to improve network security in a given scenario

Skills you'll gain

Category: Cybersecurity
Category: Security Engineering
Category: Network Security
Category: Information Technology Architecture
Category: IT Security Architecture
Category: Information Technology
Category: Identity and Access Management
Category: Endpoint Security
Category: Threat Detection
Category: Endpoint Detection and Response
Category: Application Security
Category: Information Systems Security
Category: Security Software
Category: Threat Management
Category: Computer Security Incident Management
Category: Cyber Security Strategy
Category: Incident Management
Category: Computer Security
Category: IT Infrastructure
Category: Security Information and Event Management (SIEM)
Category: Information Systems

Cybersecurity Compliance Framework, Standards & Regulations

Course 811 hours4.7 (3,250 ratings)

What you'll learn

  • Define fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process.

  • Identify cybersecurity laws and regulations, both at a national and international level and comprehend their implications for organizations.

  • Explore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports.

  • Apply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.

Skills you'll gain

Category: Information Privacy
Category: Computing Platforms
Category: Endpoint Security
Category: Enterprise Security
Category: General Networking
Category: Financial Regulation
Category: Patch Management
Category: Systems Administration
Category: Regulation and Legal Compliance
Category: Information Assurance
Category: Network Administration
Category: Windows Servers
Category: Information Technology Operations
Category: Data Security
Category: Microsoft Servers
Category: Computer Networking
Category: Data Governance
Category: Law, Regulation, and Compliance
Category: Network Infrastructure
Category: Identity and Access Management
Category: Security Engineering
Category: Regulatory Requirements
Category: Active Directory
Category: Network Security
Category: Data Strategy
Category: Cryptography
Category: Linux
Category: Server Administration
Category: IT Management
Category: Cybersecurity
Category: Payment Card Industry (PCI) Data Security Standards
Category: Encryption
Category: Information Technology
Category: Compliance Management
Category: General Data Protection Regulation (GDPR)
Category: Data Management
Category: Labor Compliance
Category: Cyber Governance
Category: Microsoft Windows
Category: Linux Administration
Category: Regulatory Compliance
Category: IT Infrastructure
Category: ISO/IEC 27001
Category: Information Systems Security

Penetration Testing, Threat Hunting, and Cryptography

Course 916 hours4.6 (2,361 ratings)

What you'll learn

  • In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.

  • Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.

  • How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.

  • Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.

Skills you'll gain

Category: Cryptography
Category: Security Engineering
Category: Scripting
Category: Incident Management
Category: Application Security
Category: Cybersecurity
Category: Python Programming
Category: Security Software
Category: Penetration Testing
Category: Criminal Investigation and Forensics
Category: Security Testing
Category: Security Information and Event Management (SIEM)
Category: Cyber Threat Hunting
Category: Network Security
Category: Incident Response
Category: Cyber Threat Intelligence
Category: Data Security
Category: Computer Programming
Category: Cyber Security Assessment
Category: Scripting Languages
Category: Vulnerability
Category: Computer Security Incident Management
Category: Vulnerability Assessments
Category: Vulnerability Management
Category: Threat Detection
Category: Computer Science

Incident Response and Digital Forensics

Course 105 hours4.7 (1,775 ratings)

What you'll learn

  • Explain the principles and importance of incident response in cybersecurity.

  • Implement techniques for detecting and analyzing security incidents.

  • Implement methods for collecting and examining digital data.

  • Analyze and report digital forensic findings to support cybersecurity efforts.

Skills you'll gain

Category: Network Security
Category: Incident Management
Category: Cybersecurity
Category: Security Information and Event Management (SIEM)
Category: Enterprise Security
Category: Security Testing
Category: Security Engineering
Category: Data Loss Prevention
Category: Infrastructure Security
Category: Information Systems Security
Category: Vulnerability Scanning
Category: Data Security
Category: DevSecOps
Category: Mobile Security
Category: Cyber Threat Hunting
Category: Penetration Testing
Category: Computer Security Incident Management
Category: Endpoint Security
Category: Investigation
Category: Computer Security
Category: Vulnerability Management
Category: Threat Management
Category: Incident Response
Category: Criminal Investigation and Forensics
Category: Security Software
Category: Threat Detection
Category: DevOps
Category: Cyber Security Assessment
Category: Application Security
Category: IT Security Architecture
Category: Vulnerability Assessments
Category: Cyber Threat Intelligence

Cybersecurity Capstone: Breach Response Case Studies

Course 1113 hours4.8 (1,462 ratings)

What you'll learn

Skills you'll gain

Category: Cybersecurity
Category: Computer Security Incident Management
Category: Payment Processing
Category: Cyber Attacks
Category: Merchant Services
Category: Security Awareness
Category: Point of Sale
Category: Incident Management
Category: Incident Response
Category: Network Security
Category: Security Strategy
Category: Security Management
Category: Vulnerability

IBM Cybersecurity Analyst Assessment

Course 127 hours4.8 (1,184 ratings)

What you'll learn

  • Get CompTIA Security+ and CompTIA CySA+ exam-ready with study tips and rigorous exam-day preparation techniques

  • Validate your exam readiness with practice tests and timed mock exams

  • Ensure you’re familiar with the domains covered in each exam and how they are marked

  • Understand the certification process for each exam, including sign-up and testing procedures

Skills you'll gain

Category: Cybersecurity
Category: Penetration Testing
Category: Network Security
Category: Vulnerability Management
Category: Learning Strategies
Category: Application Security
Category: Human Learning
Category: Cyber Security Assessment
Category: Security Testing
Category: Vulnerability Assessments

Generative AI: Boost Your Cybersecurity Career

Course 139 hours4.6 (43 ratings)

What you'll learn

  • Explain the fundamental concepts of Generative AI and its significance in cybersecurity.

  • Apply generative AI techniques to real-world cybersecurity scenarios, including UBEA, threat intelligence, report summarization, and playbooks.

  • Assess the use of generative AI in cybersecurity against threats, like phishing and malware, and understand potential NLP-based attack techniques.

  • Mitigate attacks on generative AI models and analyze real-world case studies, identifying key success factors in implementation.

Skills you'll gain

Category: Cybersecurity
Category: Security Information and Event Management (SIEM)
Category: Computer Security Incident Management
Category: Incident Management
Category: Endpoint Detection and Response
Category: Endpoint Security
Category: Threat Detection
Category: Network Security
Category: Information Technology Architecture
Category: Incident Response
Category: Generative AI
Category: Vulnerability Management
Category: IT Security Architecture
Category: Artificial Intelligence and Machine Learning (AI/ML)
Category: Artificial Intelligence
Category: Information Technology
Category: Security Engineering
Category: Threat Management
Category: Computer Science
Category: Information Systems Security
Category: Cyber Threat Hunting

Cybersecurity Job Search, Resume, and Interview Prep

Course 1410 hours4.8 (30 ratings)

What you'll learn

  • Explain cybersecurity roles, titles, responsibilities, and required skills and competencies, and explore the NICE framework

  • Create a resume, portfolio, elevator pitch, and cover letter and apply best practices to prepare for a cybersecurity job interview

  • Respond effectively to various cybersecurity interview questions, including industry, skills, experience, and behavioral

  • Discuss post-interview actions required to position yourself for success and apply tips to help during salary negotiation

Skills you'll gain

Category: Interviewing Skills
Category: Interpersonal Communications
Category: Recruitment
Category: Human Resources Software
Category: Network Security
Category: Applicant Tracking Systems
Category: Full Cycle Recruitment
Category: HR Tech
Category: Cybersecurity
Category: Human Resources
Category: Business Research
Category: Human Resources Management and Planning
Category: Communication Strategies
Category: Market Research
Category: Business Management
Category: Professional Development
Category: Lifelong Learning
Category: Talent Recruitment
Category: Price Negotiation
Category: Personal Development
Category: Recruitment Strategies
Category: Human Resources Information System (HRIS)
Category: Communication
Category: Business Correspondence
Category: Business Communication
Category: Professional Networking
Category: Talent Acquisition

Instructors

IBM Skills Network Team
IBM
58 Courses980,477 learners
Dee Dee Collette
IBM
6 Courses531,596 learners
Jeff Crume
IBM
3 Courses3,218 learners

Offered by

IBM

Build toward a degree

When you complete this Professional Certificate, you may be able to have your learning recognized for credit if you are admitted and enroll in one of the following online degree programs.¹

Why people choose Coursera for their career

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

¹Lightcast™ Job Postings Report, United States, 7/1/22-6/30/23. ²Based on program graduate survey responses, United States 2021.