EC-Council

Information Security Analyst Professional Certificate

EC-Council

Information Security Analyst Professional Certificate

Your path to a career in information security..

Build job-ready skills in ethical hacking, network defense, digital forensics & security operations

EC-Council

Instructor: EC-Council

5,025 already enrolled

Included with Coursera Plus

Earn a career credential that demonstrates your expertise

from 46 reviews of courses in this program

Beginner level

Recommended experience

4 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Earn a career credential that demonstrates your expertise

from 46 reviews of courses in this program

Beginner level

Recommended experience

4 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Learn to identify, exploit, and mitigate vulnerabilities using ethical hacking techniques.

  • Implement robust network security controls and defense strategies to protect against cyber threats.

  • Conduct forensic investigations, analyze digital evidence, and counter anti-forensics techniques.

  • Gain hands-on experience in security operations, incident response, and threat hunting.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
91% of learners achieved a positive career outcome

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your career with in-demand skills

  • Receive professional-level training from EC-Council
  • Demonstrate your technical proficiency
  • Earn an employer-recognized certificate from EC-Council

Professional Certificate - 5 course series

Information Security Fundamentals

Information Security Fundamentals

Course 1, 9 hours

What you'll learn

  • Learn fundamental security concepts.

  • Understand the importance of Information Security for the functionality of the Information System.

  • Learn how to approach and recognize common threats and vulnerabilities in regard to Information Security.

Skills you'll gain

Category: Cryptography
Category: Systems Development Life Cycle
Category: Computer Security Awareness Training
Category: Encryption
Category: Human Factors (Security)
Category: Cyber Threat Intelligence
Category: Network Security
Category: Information Assurance
Category: Security Awareness
Category: ISO/IEC 27001
Category: Security Management
Category: Threat Detection
Category: Systems Development
Category: Cyber Security Policies
Category: Cybersecurity
Category: Cryptographic Protocols
Category: Threat Management
Category: Security Controls
Category: Data Security
Category: Cyber Attacks
Ethical Hacking Essentials: Hands-On Edition

Ethical Hacking Essentials: Hands-On Edition

Course 2, 44 hours

What you'll learn

  • Fundamentals of information security and ethical hacking

  • Information security threats and vulnerabilities, types of malwares, and vulnerability assessments

  • Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures

  • Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures

Skills you'll gain

Category: Penetration Testing
Category: Network Security
Category: Wireless Networks
Category: Cybersecurity
Category: Application Security
Category: Cyber Security Assessment
Category: Cyber Attacks
Category: Web Applications
Category: Cloud Computing
Category: Cloud Security
Category: Mobile Security
Category: Vulnerability Assessments
Category: Threat Detection
Category: Encryption
Category: Vulnerability Scanning
Category: Threat Management
Category: MITRE ATT&CK Framework
Category: Exploitation techniques
Category: Security Testing
Category: Brute-force attacks
Network Defense Essentials: Hands-On Edition

Network Defense Essentials: Hands-On Edition

Course 3, 42 hours

What you'll learn

  • Fundamental concepts of network security

  • Wireless network fundamentals, types of wireless encryption, and security measures

  • Identification, authentication, and authorization

  • Cryptography techniques, cryptographic algorithms, and Public Key Infrastructure (PKI)

Skills you'll gain

Category: Authentications
Category: Wireless Networks
Category: Network Security
Category: Data Security
Category: Authorization (Computing)
Category: Information Assurance
Category: Network Monitoring
Category: Security Controls
Category: Cloud Security
Category: Cloud Computing
Category: Intrusion Detection and Prevention
Category: Cyber Security Policies
Category: Mobile Security
Category: Infrastructure Security
Category: Cryptography
Category: Data Loss Prevention
Category: Cybersecurity
Category: Enterprise Security
Category: Public Key Infrastructure
Category: Identity and Access Management
Digital Forensics Essentials: Hands-On Edition

Digital Forensics Essentials: Hands-On Edition

Course 4, 37 hours

What you'll learn

  • Network forensics fundamentals, event correlation, and network traffic investigation

  • Data acquisition concepts, types, format, and methodology

  • Computer forensics investigation process and its phases

  • Fundamental concepts of computer forensics

Skills you'll gain

Category: Digital Forensics
Category: Network Analysis
Category: File Systems
Category: Microsoft Windows
Category: Web Applications
Category: Malware Protection
Category: Data Integrity
Category: Mac OS
Category: Network Security
Category: Data Security
Category: Operating Systems
Category: Cybersecurity
Category: Linux
Category: Event Monitoring
Category: Network Monitoring
Into the Trenches: Security Operations Center

Into the Trenches: Security Operations Center

Course 5, 13 hours

What you'll learn

  • Explore Enterprise Security Structure

  • Deep Dive into the basics of incident response 

  • Understand modern threat and attacker TTPs 

  • Gain a basic primer to Security Onion 

Skills you'll gain

Category: Incident Response
Category: Intrusion Detection and Prevention
Category: Security Information and Event Management (SIEM)
Category: Cyber Threat Hunting
Category: Enterprise Security
Category: Threat Detection
Category: Vulnerability Management
Category: Event Monitoring
Category: Network Analysis
Category: Data Loss Prevention

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

EC-Council
EC-Council
10 Courses104,040 learners

Offered by

EC-Council

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Frequently asked questions

¹Based on Coursera learner outcome survey responses, United States, 2021.