We may earn an affiliate commission when you visit our partners.
Course image
(ISC)² Education & Training

Prepare for a career in the high-growth field of cybersecurity. In this program, you’ll learn in-demand skills like cryptography, network security, and security risk assessment to get job-ready in less than 4 months, with no prior experience required.

Read more

Prepare for a career in the high-growth field of cybersecurity. In this program, you’ll learn in-demand skills like cryptography, network security, and security risk assessment to get job-ready in less than 4 months, with no prior experience required.

Cybersecurity specialists help protect the security of an organization’s infrastructure, network, applications, and data. This program will teach you the essential skills employers are seeking for entry level cybersecurity specialists roles including intrusion detection, to analyze events that occur and mitigate threats. This program will not only help you start your career in cybersecurity, but also provides a strong foundation for future career development in other paths such as computer science, software development, or information technology.

You’ll also learn to comprehensively assess client computer systems, pinpoint vulnerabilities in security infrastructure, and design and deploy robust solutions. Upon completion, you’ll have a portfolio of projects and a Professional Certificate from IBM to showcase your expertise. You’ll also earn an IBM Digital badge and will gain access to resources to help you in your job search, including interview preparation. Additionally you will have built a solid foundation of the knowledge tested in the ISC2 Certified in Cybersecurity examination.

For a limited time those completing this PC will receive free of charge access to the ISC2 Certified in Cybersecurity Exam.

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Five courses

Security Principles

Welcome to Security Principles, the first course in this five-part Specialization. Upon completion, you'll be able to discuss foundational cybersecurity principles, recognize information assurance concepts, define risk management terminology, classify security controls, distinguish between policies and laws, analyze governance elements, and practice the (ISC)2 Code of Ethics.

Incident Response, BC, and DR Concepts

(3 hours)
Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans.

Access Control Concepts

(4 hours)
Welcome to the third course of this Specialization, Access Control Concepts. We will explore the types of access control every information security professional should know, including physical and logical controls and how they combine to strengthen an organization's security.

Network Security

(7 hours)
Welcome to Network Security, the fourth course in this Specialization. We'll explore computer networking and securing networks. The internet connects nearly everyone and everything, and this is accomplished through networking. While most see computer networking as a positive, criminals routinely use the internet, and the networking protocols themselves, as weapons and tools to exploit vulnerabilities. We'll review the basic components of a network, threats and attacks to the network, and learn how to protect them from attackers.

Security Operations

(8 hours)
This course focuses on the day-to-day use of security controls and risk mitigation strategies. We will explore ways to secure data and systems, and how to encourage secure practices among users.

Learning objectives

  • Recognize the importance of data security and integrity and identify preferred practices for authentication, encryption, and device security.
  • Develop working knowledge of different security threats, breaches, malware, social engineering, and other attack vectors.
  • Master the most up-to-date practical skills and knowledge cybersecurity specialists use in their daily roles.
  • Identify types of network (cyber) threats and attacks and leverage common tools to prevent these threats.

Save this collection

Save IBM and ISC2 Cybersecurity Specialist to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser