IBM
IBM Cybersecurity Analyst Professional Certificate
IBM

IBM Cybersecurity Analyst Professional Certificate

Launch your career as a cybersecurity professional. Build job-ready skills and prep for the CompTIA Security+ exam with this program.

IBM Skills Network Team
Dee Dee Collette
Jeff Crume

Instructors: IBM Skills Network Team

Included with Coursera Plus

Earn a career credential that demonstrates your expertise

(13,565 reviews)

Beginner level

Recommended experience

4 months at 10 hours a week
Flexible schedule
Earn a career credential
Share your expertise with employers
Earn a career credential that demonstrates your expertise

(13,565 reviews)

Beginner level

Recommended experience

4 months at 10 hours a week
Flexible schedule
Earn a career credential
Share your expertise with employers

What you'll learn

  • The job-ready skills you need to get an entry-level position as a cybersecurity analyst in just 4-6 months. 

  • Cybersecurity fundamentals and how to manage database vulnerabilities in operating systems administration and security. 

  • How to use cybersecurity tools and techniques to perform penetration testing, respond to incidents, and conduct forensics.

  • How to use generative AI to boost your productivity and effectiveness as a cybersecurity analyst.

Overview

What’s included

Shareable certificate

Add to your LinkedIn profile

Taught in English
143 practice exercises

Professional Certificate - 14 course series

What you'll learn

  • Compare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level.

  • Map IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity.

  • Identify the required certifications, such as Security+, A+, CISSP, and CEH, for different job roles and the contents of each certification.

  • Discover the right role for you in cybersecurity and learn how to prepare for your chosen career path.

Skills you'll gain

Cybersecurity, Information Assurance, Network Security, Data Security, Technical Support and Services, Cyber Security Assessment, Computer Security Awareness Training, Information Systems Security Assessment Framework (ISSAF), Cyber Risk, Cyber Security Strategy, General Networking, Cyber Security Policies, Information Technology, and Security Awareness

What you'll learn

  • Learn how to identify common cybersecurity threats, including malware, social engineering, breaches, and other attack vectors

  • Install software updates and patches, and apply authentication, encryption, and device-hardening techniques to protect sensitive information

  • Explore physical security, environmental safeguards, and access control measures used to prevent unauthorized access and ensure business continuity

  • Apply cybersecurity best practices using strong password creation and management strategies, and identify use cases for encryption

Skills you'll gain

Encryption, Multi-Factor Authentication, Cybersecurity, Malware Protection, Data Security, Cyber Attacks, Endpoint Security, Computer Security Awareness Training, Security Awareness, Email Security, Threat Detection, Windows Servers, Security Controls, Personally Identifiable Information, Cryptography, Microsoft Windows, Application Security, Hardening, Information Systems Security, and Information Privacy

What you'll learn

  • How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets

  • How to recognize various types of threat actors and malware and explore preventive measures

  • To identify various internet security threats and common cybersecurity best practices

  • To understand authentication and identity management concepts for safeguarding your organization

Skills you'll gain

Cybersecurity, Multi-Factor Authentication, Identity and Access Management, Malware Protection, Network Security, Computer Security Incident Management, Authentications, Human Factors (Security), Incident Response, Security Controls, Cyber Attacks, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, and Security Awareness

What you'll learn

  • Essential OS knowledge for professionals looking to get started in cybersecurity and IT support

  • How to adeptly navigate features unique to Windows, Linux, and MacOS ecosystems

  • How to manage user accounts and permissions

  • Valuable insights into foundational cloud computing concepts such as virtualization and containerization

Skills you'll gain

File Systems, Operating System Administration, Virtualization, Linux Commands, Cloud Computing, Linux Administration, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Linux Servers, Windows PowerShell, Windows Servers, Containerization, Cloud Security, Operating Systems, User Accounts, System Software, Firewall, and Virtual Machines

What you'll learn

  • Sought-after computer network and network security skills businesses need to protect the network and endpoint devices from unwanted intrusions.

  • How to apply organization policies to protect endpoint devices from attacks using firewall settings, and outbound and inbound rulesets.

  • Install, configure, apply patches and use cloud-based software to find, quarantine, and remove malware and for intrusion detection systems

  • Perform the tasks necessary to provide recommendations for network hardware devices, network security, and network monitoring and management

Skills you'll gain

Network Protocols, Network Security, Endpoint Detection and Response, Networking Hardware, Intrusion Detection and Prevention, Network Routing, Network Infrastructure, General Networking, Network Analysis, Endpoint Security, Information Systems Security, Firewall, Wireless Networks, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Security Information and Event Management (SIEM), Local Area Networks, Data Loss Prevention, TCP/IP, and Cybersecurity

What you'll learn

  • Job-ready data management skills employers need, including how to implement various data protection techniques to secure sensitive information

  • How to configure and manage database user profiles, password policies, privileges, and roles

  • How to identify, analyze, and mitigate database injection vulnerabilities, including OS commands and SQL injection

  • How to design and implement comprehensive database and application auditing models

Skills you'll gain

SQL, Data Security, Encryption, Relational Databases, Application Security, Secure Coding, NoSQL, Database Management, User Accounts, Role-Based Access Control (RBAC), Databases, Vulnerability Scanning, Database Architecture and Administration, and Data Manipulation

What you'll learn

  • Describe the five foundational principles of cybersecurity and the Confidentiality, Integrity, and Availability (CIA) triad

  • Summarize the different areas that a cybersecurity architect must adopt to develop a secure enterprise solution

  • Discuss the different security domains, including IAM, endpoint security, network security, application security, and data security

  • Demonstrate your proficiency in recommending methods to improve network security in a given scenario

Skills you'll gain

Application Security, Security Information and Event Management (SIEM), Data Security, Cyber Attacks, Firewall, Secure Coding, Identity and Access Management, Endpoint Detection and Response, Network Security, Endpoint Security, Security Testing, Authorization (Computing), Threat Detection, Cybersecurity, Infrastructure Security, Cyber Security Strategy, Data Governance, Security Controls, and Authentications

What you'll learn

  • Define fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process.

  • Identify cybersecurity laws and regulations, both at a national and international level and comprehend their implications for organizations.

  • Explore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports.

  • Apply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.

Skills you'll gain

Risk Management, NIST 800-53, Control Objectives for Information and Related Technology (COBIT), General Data Protection Regulation (GDPR), Governance Risk Management and Compliance, Information Technology Infrastructure Library, Regulatory Compliance, IT Service Management, Open Web Application Security Project (OWASP), Payment Card Industry (PCI) Data Security Standards, Cybersecurity, Artificial Intelligence, Information Technology, Compliance Management, Security Controls, Data Ethics, ISO/IEC 27001, and Auditing

What you'll learn

  • In-demand penetration and threat hunting skills, supported by hands-on practice that employers are looking for on a resume.

  • Hands-on experience applying the principles of penetration testing using tools, such as OWASP ZAP and SNYK.

  • How to create penetration testing reports and integrate AI to perform advanced threat hunting and threat intelligence.

  • Use cryptography and cryptanalysis techniques like encryption and hashing to ensure data integrity and confidentiality.

Skills you'll gain

Penetration Testing, MITRE ATT&CK Framework, Exploitation techniques, Cyber Threat Hunting, Encryption, Cyber Threat Intelligence, Cryptography, Vulnerability Assessments, Application Security, Threat Detection, Test Planning, Vulnerability Scanning, Security Testing, Cybersecurity, Open Web Application Security Project (OWASP), and Threat Modeling

What you'll learn

  • Explain the principles and importance of incident response in cybersecurity.

  • Implement techniques for detecting and analyzing security incidents.

  • Implement methods for collecting and examining digital data.

  • Analyze and report digital forensic findings to support cybersecurity efforts.

Skills you'll gain

Incident Response, Computer Security Incident Management, Technical Communication, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Data Integrity, Cyber Threat Hunting, Security Management, Cybersecurity, Incident Management, and Threat Detection

What you'll learn

  • Hands-on experience in analyzing cybersecurity case studies to identify threat tactics and assess vulnerabilities you can talk about in interviews

  • Demonstrable, practical skills for applying response frameworks and forensic techniques to real-world breach scenarios

  • Expertise in penetration testing and compliance analysis to evaluate organizational security regarding compliance successes and failures

  • Hands-on experience with researching real-world data breach scenarios and analyzing them to propose recommendations

Skills you'll gain

Incident Response, Cybersecurity, Penetration Testing, Network Security, Fraud detection, Malware Protection, Threat Detection, Email Security, Cyber Threat Intelligence, Vulnerability Assessments, Security Awareness, Data Security, Artificial Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security Incident Management, Threat Modeling, and Exploitation techniques

What you'll learn

  • Get CompTIA Security+ and CompTIA CySA+ exam-ready with study tips and rigorous exam-day preparation techniques

  • Validate your exam readiness with practice tests and timed mock exams

  • Ensure you’re familiar with the domains covered in each exam and how they are marked

  • Understand the certification process for each exam, including sign-up and testing procedures

Skills you'll gain

Incident Response, Vulnerability Management, Cyber Security Assessment, Network Architecture, Security Testing, Cyber Risk, and Cybersecurity

What you'll learn

  • Explain the fundamental concepts of Generative AI and its significance in cybersecurity.

  • Apply generative AI techniques to real-world cybersecurity scenarios, including UBEA, threat intelligence, report summarization, and playbooks.

  • Assess the use of generative AI in cybersecurity against threats, like phishing and malware, and understand potential NLP-based attack techniques.

  • Mitigate attacks on generative AI models and analyze real-world case studies, identifying key success factors in implementation.

Skills you'll gain

Threat Detection, Generative AI, Vulnerability Management, Cyber Threat Intelligence, Anomaly Detection, Threat Modeling, Incident Response, Security Information and Event Management (SIEM), Artificial Intelligence, Malware Protection, Prompt Engineering, Cybersecurity, and Intrusion Detection and Prevention

What you'll learn

  • Explain cybersecurity roles, titles, responsibilities, and required skills and competencies, and explore the NICE framework

  • Create a resume, portfolio, elevator pitch, and cover letter and apply best practices to prepare for a cybersecurity job interview

  • Respond effectively to various cybersecurity interview questions, including industry, skills, experience, and behavioral

  • Discuss post-interview actions required to position yourself for success and apply tips to help during salary negotiation

Skills you'll gain

Interviewing Skills, Professional Networking, Applicant Tracking Systems, Business Research, Negotiation, Job Analysis, Communication, Presentations, Recruitment, Cybersecurity, LinkedIn, Portfolio Management, Recruitment Strategies, Writing, Compensation Strategy, Social Media, and Market Research

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Build toward a degree

When you complete this Professional Certificate, you may be able to have your learning recognized for credit if you are admitted and enroll in one of the following online degree programs.¹

 
ACE Logo

This Professional Certificate has ACE® recommendation. It is eligible for college credit at participating U.S. colleges and universities. Note: The decision to accept specific credit recommendations is up to each institution. 

Instructors

IBM Skills Network Team
84 Courses1,569,948 learners
Dee Dee Collette
IBM
11 Courses641,904 learners
Jeff Crume
IBM
3 Courses13,895 learners
Dr. Manish Kumar
IBM
8 Courses189,822 learners
Rav Ahuja
IBM
56 Courses4,371,838 learners

Offered by

IBM

Compare with similar products

Rating
Level
Skills
Tools
Last updated
Number of practice exercises
Degree eligibility
Part of Coursera Plus

You might also like

Why people choose Coursera for their career

Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

¹ Median salary and job opening data are sourced from Lightcast™ Job Postings Report. Content Creator, Machine Learning Engineer and Salesforce Development Representative (1/1/2024 - 12/31/2024) All other job roles (10/1/2024 - 10/1/2025)