IBM
ISC2

IBM and ISC2 Cybersecurity Specialist Professional Certificate

4 days left! Save on skills that make you shine with 40% off 3 months of Coursera Plus. Save now

IBM
ISC2

IBM and ISC2 Cybersecurity Specialist Professional Certificate

Get job-ready to launch your cybersecurity career.

Build the information security skills and hands-on experience employers look for in less than 4 months. No prior experience required.

IBM Skills Network Team
Dee Dee Collette
Rav Ahuja

Instructors: IBM Skills Network Team

24,789 already enrolled

Earn a career credential that demonstrates your expertise

from 14,746 reviews of courses in this program

Beginner level
No prior experience required
Flexible schedule
3 months at 10 hours a week
Learn at your own pace
Prepare for a degree
Earn a career credential that demonstrates your expertise

from 14,746 reviews of courses in this program

Beginner level
No prior experience required
Flexible schedule
3 months at 10 hours a week
Learn at your own pace
Prepare for a degree

What you'll learn

  • The job-ready skills needed to get your first cybersecurity role, plus prep for the ISC2 Certified in Cybersecurity (CC) exam employers look for.

  • A solid grasp of IT essentials, including infrastructure, operating systems, network applications, data, hardware, and software.

  • Working knowledge of different security threats, breaches, malware, social engineering, and other attack, and tools for preventing these threats.

  • The most up-to-date practical skills and knowledge cybersecurity specialists use in their daily roles, supported by hands-on practical experience.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Professional Certificate - 12 course series

Introduction to Cybersecurity Careers

Introduction to Cybersecurity Careers

Course 1, 8 hours

What you'll learn

  • Compare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level.

  • Map IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity.

  • Identify the required certifications, such as Security+, A+, CISSP, and CEH, for different job roles and the contents of each certification.

  • Discover the right role for you in cybersecurity and learn how to prepare for your chosen career path.

Skills you'll gain

Category: Cybersecurity
Category: Vulnerability Assessments
Category: Information Assurance
Category: Data Security
Category: Network Security
Category: Penetration Testing
Category: Computer Security Awareness Training
Category: Operating Systems
Category: Cyber Security Policies
Category: Computer Hardware
Category: Security Awareness
Category: Cloud Security
Category: Incident Response
Category: Cyber Security Strategy
Category: Technical Support and Services
Category: Information Technology
Introduction to Hardware and Operating Systems

Introduction to Hardware and Operating Systems

Course 2, 16 hours

What you'll learn

  • Identify the hardware components of desktops, laptops, and other devices, plus operating system functions, settings, and troubleshooting processes

  • Explore ports, connectors, storage devices, and GPU architectures, and assess appropriate processing and hardware solutions for applications

  • Develop secure IoT integration strategies for wearable devices and smart tech, using effective device management and cybersecurity principles.

  • Evaluate VR and AR technologies for organizational use, assessing hardware requirements, deployment considerations, and practical applications.

Skills you'll gain

Category: Computer Hardware
Category: Operating Systems
Category: Peripheral Devices
Category: User Accounts
Category: Hardware Troubleshooting
Category: System Configuration
Category: Technical Support
Category: Data Storage
Category: Network Infrastructure
Category: Disaster Recovery
Category: Virtual Machines
Category: Software Installation
Category: Operating System Administration
Category: File Systems
Category: Mac OS
Category: Computer Systems
Category: Computer Architecture
Category: Linux
Category: Virtualization
Category: Virtualization and Virtual Machines
Introduction to Software, Programming, and Databases

Introduction to Software, Programming, and Databases

Course 3, 18 hours

What you'll learn

  • Classify, install, and administer software applications and tools, including those used on mobile operating systems

  • Learn foundational concepts in cloud services, browser technologies, and software development models, techniques, and best practices

  • Utilize core database concepts using the principles of database management and perform basic operations to interface with and maintain databases

  • Understand how AI enables intelligent tools such as chatbots, virtual assistants, and generative applications to solve real-world problems

Skills you'll gain

Category: Generative AI
Category: Computer Programming
Category: Programming Principles
Category: Cross Platform Development
Category: Other Programming Languages
Category: Generative AI Agents
Category: Database Management Systems
Category: Cloud Computing Architecture
Category: Artificial Intelligence and Machine Learning (AI/ML)
Category: Systems Development Life Cycle
Category: Artificial Intelligence
Category: Database Application
Category: Data-Driven Decision-Making
Category: Data Storage Technologies
Category: Data Strategy
Category: Cloud Deployment
Category: Software Development Methodologies
Category: Cloud Services
Category: Package and Software Management
Introduction to Networking and Storage

Introduction to Networking and Storage

Course 4, 12 hours

What you'll learn

  • Explain wired and wireless network types, topologies, cable categories, IP addressing, packet flow, and core protocols

  • Configure secure networks and mobile devices using encryption standards and troubleshooting tools, including the command prompt and Windows Settings

  • Explore memory and storage technologies, including RAM, ROM, RAID, STaaS, file/block/object storage, USB4, and NVMe, andtroubleshooting methods

  • Apply NFC operating modes, Wi-Fi security protocols, and device integration techniques to evaluate modern networking and storage solutions

Skills you'll gain

Category: General Networking
Category: Wireless Networks
Category: Network Model
Category: Network Troubleshooting
Category: Command-Line Interface
Category: OSI Models
Category: Network Security
Category: Network Protocols
Category: Data Storage Technologies
Category: Data Storage
Category: TCP/IP
Category: Networking Hardware
Category: Wide Area Networks
Category: Network Architecture
Category: Microsoft Windows
Category: Computer Networking
Category: Network Infrastructure
Category: Telecommunications
Category: Network Planning And Design
Category: Local Area Networks
Introduction to Cloud Computing

Introduction to Cloud Computing

Course 5, 12 hours

What you'll learn

  • Define cloud computing and explain essential characteristics, history, the business case for cloud, and the emerging technologies enabled by cloud

  • Describe the cloud service models- IaaS, PaaS, SaaS, and cloud deployment models- Public, Private, Hybrid; explain cloud infrastructure components

  • Explain emerging Cloud related trends including HybridMulticloud, Microservices, Serverless, Cloud Native, DevOps, and Application Modernization

  • List and describe services of popular cloud platforms including AWS, Microsoft Azure, Google Cloud, IBM Cloud, Alibaba Cloud, and others

Skills you'll gain

Category: Cloud Security
Category: Cloud Computing
Category: Cloud Services
Category: Hybrid Cloud Computing
Category: Microservices
Category: Infrastructure As A Service (IaaS)
Category: DevOps
Category: Cloud Storage
Category: Cloud-Native Computing
Category: Serverless Computing
Category: Cloud Computing Architecture
Category: Cloud Deployment
Category: Virtual Machines
Category: IBM Cloud
Category: Emerging Technologies
Category: Cloud Platforms
Category: Cloud Infrastructure
Category: Cloud Engineering
Category: Cloud Technologies
Introduction to Cybersecurity Essentials

Introduction to Cybersecurity Essentials

Course 6, 13 hours

What you'll learn

  • Learn how to identify common cybersecurity threats, including malware, social engineering, breaches, and other attack vectors

  • Install software updates and patches, and apply authentication, encryption, and device-hardening techniques to protect sensitive information

  • Explore physical security, environmental safeguards, and access control measures used to prevent unauthorized access and ensure business continuity

  • Apply cybersecurity best practices using strong password creation and management strategies, and identify use cases for encryption

Skills you'll gain

Category: Multi-Factor Authentication
Category: Malware Protection
Category: Data Security
Category: Cybersecurity
Category: Encryption
Category: Cyber Attacks
Category: Endpoint Security
Category: Patch Management
Category: Cryptography
Category: Threat Management
Category: Hardening
Category: Identity and Access Management
Category: Application Security
Category: Threat Detection
Category: Security Awareness
Category: Authentications
Category: Authorization (Computing)
Category: Email Security
Category: Security Controls
Security Principles

Security Principles

Course 7, 5 hours

What you'll learn

Skills you'll gain

Category: Cyber Governance
Category: Security Awareness
Category: Data Ethics
Category: Cyber Security Policies
Category: Information Assurance
Category: Cybersecurity
Category: Governance
Category: Cyber Risk
Category: Security Controls
Category: Risk Management Framework
Incident Response, BC, and DR Concepts

Incident Response, BC, and DR Concepts

Course 8, 3 hours

What you'll learn

Skills you'll gain

Category: Disaster Recovery
Category: Incident Response
Category: Business Continuity Planning
Category: Incident Management
Category: Computer Security Incident Management
Category: Crisis Management
Category: Security Management
Category: Cybersecurity
Category: Business Continuity
Access Control Concepts

Access Control Concepts

Course 9, 4 hours

What you'll learn

Skills you'll gain

Category: Data Security
Category: Information Systems Security
Category: User Provisioning
Category: Multi-Factor Authentication
Category: Security Controls
Category: Cyber Security Policies
Category: Authorization (Computing)
Category: Cybersecurity
Category: Identity and Access Management
Category: Authentications
Category: Data Access
Category: Role-Based Access Control (RBAC)
Network Security

Network Security

Course 10, 8 hours

What you'll learn

Skills you'll gain

Category: Network Security
Category: Firewall
Category: Distributed Denial-Of-Service (DDoS) Attacks
Category: Cloud Services
Category: Threat Detection
Category: IT Security Architecture
Category: Cybersecurity
Category: OSI Models
Category: Data Centers
Category: General Networking
Category: Infrastructure Security
Category: Data Security
Category: Network Planning And Design
Category: Computer Networking
Category: Cloud Security
Category: Cyber Attacks
Category: Network Model
Category: Threat Management
Category: Intrusion Detection and Prevention
Category: Network Protocols
Security Operations

Security Operations

Course 11, 8 hours

What you'll learn

Skills you'll gain

Category: Encryption
Category: Security Controls
Category: Security Awareness
Category: Network Security
Category: IT General Controls (ITGC)
Category: Network Administration
Category: Computer Security Awareness Training
Category: Cyber Operations
Category: Configuration Management
Category: Cybersecurity
Category: Cyber Security Policies
Category: System Configuration
Category: Event Monitoring
Category: Cryptography
Category: Data Security
Category: Continuous Monitoring
Category: Information Technology Operations
Category: System Monitoring
Category: Patch Management
Category: Security Management
Cybersecurity Case Studies and Capstone Project

Cybersecurity Case Studies and Capstone Project

Course 12, 17 hours

What you'll learn

  • Hands-on experience in analyzing cybersecurity case studies to identify threat tactics and assess vulnerabilities you can talk about in interviews

  • Demonstrable, practical skills for applying response frameworks and forensic techniques to real-world breach scenarios

  • Expertise in penetration testing and compliance analysis to evaluate organizational security regarding compliance successes and failures

  • Hands-on experience with researching real-world data breach scenarios and analyzing them to propose recommendations

Skills you'll gain

Category: Incident Response
Category: Penetration Testing
Category: Digital Forensics
Category: Network Security
Category: Computer Security Incident Management
Category: Cyber Security Assessment
Category: AI Security
Category: Security Awareness
Category: Cybersecurity
Category: Malware Protection
Category: Threat Detection
Category: Vulnerability Assessments
Category: Exploitation techniques

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Get a head start on your degree

When you complete this Professional Certificate, you may be able to have your learning recognized for credit if you are admitted and enroll in one of the following online degree programs.¹

ACE Logo

This Professional Certificate has ACE® recommendation. It is eligible for college credit at participating U.S. colleges and universities. Note: The decision to accept specific credit recommendations is up to each institution. 

Instructors

IBM Skills Network Team
92 Courses1,996,922 learners
Dee Dee Collette
IBM
11 Courses734,202 learners
Rav Ahuja
IBM
55 Courses5,035,256 learners

Offered by

IBM
ISC2

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Frequently asked questions

¹ Median salary and job opening data are sourced from Lightcast™ Job Postings Report. Content Creator, Machine Learning Engineer and Salesforce Development Representative (1/1/2024 - 12/31/2024) All other job roles (5/1/2025 - 5/1/2026)