IBM
ISC2
IBM and ISC2 Cybersecurity Specialist Professional Certificate
IBM
ISC2

IBM and ISC2 Cybersecurity Specialist Professional Certificate

Get job-ready to launch your cybersecurity career. Build the information security skills and hands-on experience employers look for in less than 4 months. No prior experience required.

IBM Skills Network Team
Dee Dee Collette
Rav Ahuja

Instructors: IBM Skills Network Team

14,554 already enrolled

Earn a career credential that demonstrates your expertise
4.8

(560 reviews)

Beginner level
No prior experience required
Flexible schedule
3 months, 10 hours a week
Learn at your own pace
Prepare for a degree
Earn a career credential that demonstrates your expertise
4.8

(560 reviews)

Beginner level
No prior experience required
Flexible schedule
3 months, 10 hours a week
Learn at your own pace
Prepare for a degree

What you'll learn

  • The job-ready skills needed to get your first cybersecurity role, plus prep for the ISC2 Certified in Cybersecurity (CC) exam employers look for.

  • A solid grasp of IT essentials, including infrastructure, operating systems, network applications, data, hardware, and software.

  • Working knowledge of different security threats, breaches, malware, social engineering, and other attack, and tools for preventing these threats.

  • The most up-to-date practical skills and knowledge cybersecurity specialists use in their daily roles, supported by hands-on practical experience.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English

Professional Certificate - 12 course series

What you'll learn

  • Compare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level.

  • Map IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity.

  • Identify the required certifications such as Security+, A+, CISSP, and CEH   for different job roles and the contents of each certification.

  • Discover the right role for you in cybersecurity and learn how to prepare for your chosen career path.

Skills you'll gain

Category: Malware Protection
Category: Security Management
Category: Digital Forensics
Category: Cyber Attacks
Category: Network Security
Category: Email Security
Category: Threat Detection
Category: Vulnerability Management
Category: Computer Security Incident Management
Category: Cybersecurity
Category: Artificial Intelligence
Category: Incident Response
Category: Security Awareness
Category: Threat Modeling
Category: Vulnerability Assessments
Category: Penetration Testing
Category: Cybersecurity Case Study Analysis

What you'll learn

  • Demonstrate an understanding of operating system fundamentals.

  • Recognize desktop and laptop hardware components and devices.

  • Identify and describe internal desktop and laptop computer components, interfaces, and peripherals.

  • Explain basic workstation setup, locate operating system settings, and identify good troubleshooting practices.

Skills you'll gain

Category: Security Management
Category: Data Ethics
Category: Cyber Security Policies
Category: Data Integrity
Category: Cyber Governance
Category: Cybersecurity
Category: Information Systems Security
Category: security
Category: Security Awareness
Category: Security Controls
Category: Risk Management Framework
Category: Risk
Category: Information Assurance
Category: Cyber Risk
Category: governance

What you'll learn

  • Classify, install, configure, and manage software including mobile platforms.

  • Discuss cloud computing and web browser concepts.

  • Explain software development models, techniques, and concepts.

  • Describe fundamental database management concepts.

Skills you'll gain

Category: Security Management
Category: Technical Support and Services
Category: Network Security
Category: Information Technology
Category: Application Security
Category: CompTIA Certifications
Category: Cyber Security Strategy
Category: Computer Security Awareness Training
Category: ISC2 certifications
Category: Information Security (INFOSEC)
Category: Cybersecurity Careers
Category: Cybersecurity

What you'll learn

  • Identify wired and wireless network types, explain physical and logical topology, differentiate network cable types and what each is used for.

  • List common network devices. Discover what packets are and how IP addresses work, and explain what protocols are and why models are necessary.

  • Determine how to set up and encrypt networks and mobile devices. Diagnose connectivity issues and utilize the command prompt and Windows Settings.

  • List network drive types, explain RAM, ROM, and RAID, and troubleshoot storage issues. Explain STaaS, and define file, block, and object storage.

Skills you'll gain

Category: Information Technology
Category: System Configuration
Category: File Systems
Category: Operating Systems
Category: General Networking
Category: IT Fundamentals
Category: Mac OS
Category: Data Storage
Category: User Accounts
Category: Technical Support
Category: Linux Administration
Category: Peripheral Devices
Category: Computer Systems
Category: Microsoft Windows
Category: Computer Hardware
Category: Desktop Support
Category: Troubleshooting
Category: Hardware Troubleshooting
Category: Networking Hardware
Category: hardware
Introduction to Cloud Computing

Introduction to Cloud Computing

Course 512 hours

What you'll learn

  • Define cloud computing and explain essential characteristics, history, the business case for cloud, and the emerging technologies enabled by cloud

  • Describe the cloud service models- IaaS, PaaS, SaaS, and cloud deployment models- Public, Private, Hybrid; explain cloud infrastructure components

  • Explain emerging Cloud related trends including HybridMulticloud, Microservices, Serverless, Cloud Native, DevOps, and Application Modernization

  • List and describe services of popular cloud platforms including AWS, Microsoft Azure, Google Cloud, IBM Cloud, Alibaba Cloud, and others

Skills you'll gain

Category: Command-Line Interface
Category: OSI Models
Category: Cloud Services
Category: System Configuration
Category: General Networking
Category: Wireless Networks
Category: Local Area Networks
Category: Computer Networking
Category: Network Administration
Category: TCP/IP
Category: Network Architecture
Category: Network Protocols
Category: Data Storage
Category: Network Model
Category: Microsoft Windows
Category: Cloud Storage
Category: Network Troubleshooting
Category: Networking Hardware

What you'll learn

  • Recognize the importance of data security, maintaining data integrity, and confidentiality

  • Demonstrate the installation of software updates and patches

  • Identify preferred practices for authentication, encryption, and device security

  • Discuss types of security threats, breaches, malware, social engineering, and other attack vectors

Skills you'll gain

Category: Cyber Attacks
Category: Network Security
Category: Data Centers
Category: Threat Detection
Category: General Networking
Category: Computer Networking
Category: Cybersecurity
Category: TCP/IP
Category: Network Protocols
Category: Network Model
Category: Threat
Category: Cloud Computing
Category: Infrastructure Security
Category: Network Planning And Design
Category: Cyberattacks
Security Principles

Security Principles

Course 75 hours

What you'll learn

Skills you'll gain

Category: Malware Protection
Category: Hardening
Category: Cyber Attacks
Category: Data Security
Category: Email Security
Category: Cryptography
Category: Multi-Factor Authentication
Category: Cybersecurity
Category: Authentications
Category: Identity and Access Management
Category: Information Systems Security
Category: Security Awareness
Category: Security Controls
Category: Encryption
Category: Application Security
Category: Authorization (Computing)
Category: Computer Security Awareness Training
Category: Information Security (INFOSEC)
Category: Browser Compatibility
Category: Cyberattacks

What you'll learn

Skills you'll gain

Category: Security Management
Category: Security Controls
Category: Authorization (Computing)
Category: administrative controls
Category: Data Access
Category: Enterprise Security
Category: Role-Based Access Control (RBAC)
Category: Cybersecurity
Category: Logical Controls
Category: Physical Controls
Category: Identity and Access Management
Category: Authentications
Access Control Concepts

Access Control Concepts

Course 94 hours

What you'll learn

Skills you'll gain

Category: Security Management
Category: Business Continuity
Category: Disaster Recovery
Category: Information Assurance
Category: Cybersecurity
Category: Crisis Management
Category: Computer Security Incident Management
Category: Incident Response
Network Security

Network Security

Course 108 hours

What you'll learn

Skills you'll gain

Category: Continuous Monitoring
Category: Cyber Security Policies
Category: Network Security
Category: Data Security
Category: System Configuration
Category: Information Technology Operations
Category: General Networking
Category: Cryptography
Category: Data Integrity
Category: Key Management
Category: Cybersecurity
Category: Configuration Management
Category: security
Category: Security Awareness
Category: Encryption
Category: Security Controls
Category: Event Monitoring
Category: System Monitoring
Category: Asset
Security Operations

Security Operations

Course 118 hours

What you'll learn

Skills you'll gain

Category: Databases
Category: Software Development Process
Category: Information Technology
Category: Computer Programming
Category: Programming Principles
Category: Software Versioning
Category: Web Applications
Category: Software Installation
Category: IT Fundamentals
Category: Application Development
Category: Computing Platforms
Category: Database Management
Category: Software Development Life Cycle
Category: Database basics
Category: Software Application Development
Category: Cloud Computing
Category: Browser Compatibility

What you'll learn

  • Hands-on experience in analyzing cybersecurity case studies to identify threat tactics and assess vulnerabilities you can talk about in interviews

  • Demonstrable, practical skills for applying response frameworks and forensic techniques to real-world breach scenarios

  • Expertise in penetration testing and compliance analysis to evaluate organizational security regarding compliance successes and failures

  • Hands-on experience with researching real-world data breach scenarios and analyzing them to propose recommendations

Skills you'll gain

Category: Emerging Technologies
Category: Serverless Computing
Category: Cloud Services
Category: Cloud Security
Category: Virtualization
Category: IBM Cloud
Category: Cloud Computing Architecture
Category: Cloud Platforms
Category: Iaas PaaS Saas
Category: Cloud Native
Category: Microservices
Category: Hybrid Cloud Computing
Category: Containerization
Category: Devops
Category: Cloud Storage
Category: Infrastructure As A Service (IaaS)
Category: Cloud Infrastructure
Category: Cloud Computing
Category: Hybrid Multicloud

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Get a head start on your degree

When you complete this Professional Certificate, you may be able to have your learning recognized for credit if you are admitted and enroll in one of the following online degree programs.Âą

 
ACE Logo

This Professional Certificate has ACE® recommendation. It is eligible for college credit at participating U.S. colleges and universities. Note: The decision to accept specific credit recommendations is up to each institution. 

Instructors

IBM Skills Network Team
IBM
67 Courses1,235,177 learners
Dee Dee Collette
IBM
8 Courses589,155 learners
Rav Ahuja
IBM
54 Courses3,557,352 learners

Offered by

IBM
ISC2

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

¹ Median salary and job opening data are sourced from Lightcast™ Job Postings Report. Content Creator, Machine Learning Engineer and Salesforce Development Representative (1/1/2024 - 12/31/2024) All other job roles (4/1/2024 - 4/1/2025)