IBM Cybersecurity Analyst Certificate Online

This is the IBM cybersecurity training and cybersecurity analyst certificate that gives you the technical skills and practical application required for helping prevent cyber intrusion.

Certificate | Intermediate | 5-6 months | Coursera
Price: Included in $49 monthly subscription
GET UP TO 10 COLLEGE CREDITS

Franklin University has partnered with Coursera Campus to provide cutting-edge certificates to learners seeking to advance. Courses are open to all learners. No application required.

Included in your subscription

Get unlimited access to over 7,000 offerings found on the Coursera website – including guided projects, specializations and professional certificates offered by hundreds of leading universities and companies. You also get access to all 39 professional certificates found in the Franklin Marketplace.

LEARN MORE


What You Will Learn

  • Learn the basic terms, concepts, tools and systems of cybersecurity, and be able to recognize security threats and common vulnerabilities
  • Develop an understanding of data protection risks, network defensive tactics, and access controls for operating systems and networks
  • Take a deep dive into cryptography, encryption, endpoint security and patch management
  • Explore the phases of penetration testing, incident response methodologies and the forensic investigation process

About the IBM Cybersecurity Analyst Professional Certificate

With or without a college degree, the need for cybersecurity analysts, technicians and pros is at an all-time high. So, whether you're entering the workforce or making a career switch, you'll still need to equip yourself with the technical skills required to take on a role in cybersecurity.

The IBM Cybersecurity Analyst Professional Certificate is a great way to acquire both the know-how and technical skills used by today's cybersecurity analysts.

Featuring eight courses developed by IBM, this certificate program features self-paced lessons, interactive content and hands-on learning projects.

Through your studies, you'll learn the key concepts of cyber analysis, ranging from network security and threat analysis to vulnerability assessment and incident response. You'll also be introduced to the tools, labs and libraries used in information security, such as Wireshark, SecurityLearningAcademy.com and Python.

Even better, you'll learn the "why" behind the "what" of cybersecurity, giving you the opportunity to apply what you learn to a real-world security breach.

Required IBM Cybersecurity Analyst Certificate Courses

Introduction to Cybersecurity Careers

BEGINNER | Computer Science | Self-paced | 8 hours

There is a great demand for cybersecurity professionals and expected to continue into the foreseeable future. Thus making it the right time to launch into a cybersecurity career. This course gives an insight into the various career options in cybersecurity. It is designed to give you the knowledge required to find and secure the right career for you in the information security (Infosec) industry. The course begins by addressing the widening employment gap in cybersecurity, detailing the various roles and responsibilities associated with different career levels. You will learn the importance of both technical and soft skills, providing a balanced approach to professional development. In addition, you will also become familiar with the most recognized certifications in the field provided by organizations such as CompTIA, ISC2 like A+ and CISSP and so on. Throughout this course you will hear from several cybersecurity experts sharing their insights and experiences on how to start a career in cybersecurity. This course is suitable for anyone who aspires to launch a rewarding career in cybersecurity. It does not require any prior degree or cybersecurity background.
Introduction to Cybersecurity Essentials

BEGINNER | Information Technology | Self-paced | 13 hours

With this beginner friendly course, learn fundamental Cybersecurity skills that are crucial for anyone using computing devices and connecting to the Internet. You will first learn to recognize common security threats and risks that individuals and organizations may face, such as theft, tampering, and destruction of sensitive information. You’ll then discover the characteristics of cyber-attacks and learn how you can employ best practices to guard against them. Next, you’ll learn about the best practices against cyberattacks. These include using strong passwords, good password management, and multi-factor authentication. You’ll learn ways in which you can strengthen your security plan with techniques like device hardening, encryption and more. You’ll then learn about safe browsing practices. You’ll gain an understanding of why you must practice safe browsing; to protect yourself against hackers, phishing, identity theft, security leaks, privacy issues and more. You’ll also explore methods for securing and managing confidential information. Then, discover how to configure browsers to help reduce security breaches. Throughout this course you will complete many hands-on labs which will enhance your understanding of course material. At the end of this course, you will have the opportunity to complete a final project where you will demonstrate your proficiency in cybersecurity. Designed specifically for beginners and those who are interested in a Cybersecurity Specialist or Analyst roles as well as entry-level roles in Information Security (Infosec) engineering. This course dives into the world of cybersecurity to give you the critical skills employers need. It also supports the needs of technical and IT support roles, who can find themselves on the front lines of defense for cybersecurity issues.
Introduction to Cybersecurity Tools & Cyberattacks

BEGINNER | Information Technology | Self-paced | 12 hours

According to a recent IBM report, cyberattacks have surged 71%! This alarming statistic highlights a huge demand for cybersecurity professionals. This IBM course will introduce you to fundamental cybersecurity concepts, threats, and preventive measures to start your cybersecurity journey. In this course, you’ll explore the evolution of cybersecurity and discover the critical thinking model. You’ll also cover threat actors, malware, ransomware, and defenses against social engineering. Additionally, you’ll learn about internet security threats and security controls. You’ll explore the fundamentals of identity and access management (IAM), authentication, and access control. You’ll also look at the physical threats organizations encounter and consider effective security measures. Throughout, you’ll build practical knowledge through hands-on labs and gain technical expertise through insights from industry experts. Your final project will enable you to effectively demonstrate your understanding of cybersecurity principles. This course is for anyone who wants a basic understanding of cybersecurity and is part of a series designed to help you start a career as a Cybersecurity Analyst.
Operating Systems: Overview, Administration, and Security

BEGINNER | Computer Science | Self-paced | 17 hours

51% of organizations are planning to increase security investments as a result of a breach (IBM Report). Companies need skilled IT support and cybersecurity professionals now more than ever. Whether you’re just starting out or switching to tech, this course provides the critical operating systems (OS) knowledge you need to move forward. Operating systems are fundamental to all aspects of computing. In this course, you’ll learn foundational concepts common to all operating systems and the unique aspects of Windows, Linux, and MacOS. You’ll explore OS file systems and the associated security features. You'll discover the macOS features that revolutionized OS functionality. Plus, you’ll investigate virtualization and containerization. Additionally, through labs and a final project, you’ll get hands-on managing virus and threat protection, configuring user accounts and permissions with command-line tools, and securing systems against threats. If you’re looking to get started IT or cybersecurity, enroll today to gain essential knowledge in operating systems that enables you to work towards a career in cybersecurity, system administration, network engineering, or IT support.
Computer Networks and Network Security

INTERMEDIATE | Computer Science | Self-paced | 33 hours

The US Bureau of Labor Statistics forecasts a 32% growth in information security analyst jobs until 2032. These analysts are in demand as part of the team that keeps networks secure.    This course provides practical hands-on computer networking and network security experience that employers want. Through innovative hands-on labs, you'll learn how to secure a small home office network (SOHO), install and configure DHCP, and filter DNS. You’ll also get real-world practice installing and using an open-source Extended Detection and Response (XDR) system.    Additionally, you’ll build valuable supporting knowledge of ports, protocols, and IP addresses, including IPv6 and network routing. You’ll learn about Layer 2 and 3 addressing, routers, and routing tables.   Plus, you’ll develop knowledge of cybersecurity analyst tools for data protection, endpoint protection, and SIEM, which you can apply to an organization’s compliance and threat intelligence needs, which is crucial in today’s cybersecurity landscape.  You’ll complete a final project where you will demonstrate your ability to perform network and security planning tasks.  Networking and network security skills pay. Invest in yourself and enroll today! 
Database Essentials and Vulnerabilities

BEGINNER | Computer Science | Self-paced | 15 hours

The average cost of a data breach is nearly $5 million, with 70% of the affected organizations reporting significant or very significant disruption, according to an IBM report. Hence, businesses are hunting hard for cybersecurity experts who can safeguard against such threats. This course builds critical database security skills that employers are looking for.   During the course, you’ll look at key concepts of database management, including relational and non-relational databases. You’ll learn the basics of SQL and databases and practice creating and executing simple SQL statements. You’ll also build foundational knowledge in relational data concepts, such as roles, permissions, and management techniques.   You’ll explore database security, including encryption, hashing, masking, tokenization, and permission restrictions. You’ll also review user profiles, password policies, and privileges and learn to design and implement robust database application security and auditing models. In addition, you’ll dive into database injection vulnerabilities, focusing on OS command injection, SQL injection, and more.  As you progress, you’ll get hands-on experience in practical labs working on user management and access control, so you have a firm understanding of how to manage, secure, and audit databases effectively.    Enroll today to build critical security skills in database management that will capture the attention of employers!  employers!
Cybersecurity Architecture

INTERMEDIATE | Information Technology | Self-paced | 12 hours

In a digital world, data drives the world’s economy, and almost all cyberattacks aim at stealing sensitive information or holding data hostage. Did you know that according to a recent IBM study, "the global average cost of a data breach was USD 4.45 million, a 15% increase over 3 years"? If you are getting started with a career in cybersecurity or just curious about how cybersecurity works, join us on this five-module course on Cybersecurity Architecture. You will learn from a distinguished IBM cybersecurity engineer who is also an adjunct professor at a local university. This course is intended for anyone interested in learning about cybersecurity. The course covers the fundamentals of cybersecurity, including topics like five security principles, CIA triad, Identity and Access Management (IAM), endpoint security, and security domains. Learn about the detection and response concepts and tools. In a nutshell, you will get a holistic view of prevention, detection, and response. The course will give you an opportunity to practice some concepts through activities and labs. You will also have an opportunity to test your knowledge through quizzes across different modules! Come, explore cybersecurity!
Cybersecurity Compliance Framework, Standards & Regulations

INTERMEDIATE | Computer Science | Self-paced | 11 hours

Cyber threats present a constant challenge today, costing billions and affecting everyone, from governments to small businesses. Are you ready to contribute to the solution? This course will provide you with a deep understanding of cybersecurity principles, industry standards, regulations, and audit processes. You will explore the fundamental concepts of information security and compliance, covering topics such as governance, risk, compliance, cybersecurity frameworks, and process management. You will also learn about IT service management and explore the NIST risk management framework and AI ethical considerations. You will gain insights into cybersecurity laws and regulations, focusing on both US and global perspectives, including HIPPA, GDPR, and PCI DSS. Additionally, you will familiarize yourself with the audit processes using the COBIT framework and SOC reports. You will also explore prominent standards such as OWASP, ISO, and IEEE, learning how to apply them effectively. Throughout this five-module self-paced course, you will engage in interactive activities to apply your knowledge in real-world scenarios. You will also complete a final project to test your skills and showcase your understanding. Join us on this cybersecurity journey!
Penetration Testing, Threat Hunting, and Cryptography

INTERMEDIATE | Information Technology | Self-paced | 34 hours

The cost of a security breach averages nearly $5M (IBM) and is increasing every year. So, businesses are always looking for professionals who can anticipate threats and prevent them. This IBM Penetration Testing, Threat Hunting, and Cryptography course builds expertise in identifying vulnerabilities, protecting assets, and using AI and cryptography techniques to strengthen an organization’s cybersecurity posture. During the course, you’ll explore the penetration testing phases and gain practical experience performing software pen testing and scanning code repositories. You’ll also learn to create comprehensive pen testing reports, perform threat hunting, and integrate AI into threat intelligence. Plus, you’ll learn to leverage Cyber Threat Intelligence (CTI) frameworks for effective threat identification. Finally, you’ll explore cryptography, including encryption, decryption, and hashing techniques, while also learning about common cryptographic attacks and cryptanalysis methods. To complete the hands-on labs and project, you’ll require a laptop or desktop and basic knowledge of networking and cybersecurity. This course is ideal for existing and aspiring cybersecurity professionals looking to enhance their skills and advance their careers. It is recommended that you have fundamental knowledge of IT systems and cybersecurity principles prior to starting this course. If you’re looking to build in-demand cybersecurity skills in threat prevention, enroll today! In five weeks, you’ll add penetration testing, threat hunting, and cryptography to your resume.
Incident Response and Digital Forensics

INTERMEDIATE | Information Technology | Self-paced | 33 hours

This IBM course will teach you the critical skills needed to manage and investigate cybersecurity incidents. You will learn about key topics, including incident response frameworks (NIST and SANS), digital forensics methodologies, and best practices for handling digital evidence. Through hands-on labs and projects, you’ll gain practical experience in detecting, analyzing, and mitigating cybersecurity threats, as well as conducting forensic investigations using industry-standard tools. By the end of the course, you will be equipped to implement incident response plans, collect and analyze digital evidence, and report findings to support cybersecurity efforts. This course is ideal for learners looking to strengthen their expertise in digital forensics and incident response, making it an essential component for those aiming to advance in the cybersecurity field.
Cybersecurity Capstone: Breach Response Case Studies

BEGINNER | Information Technology | Self-paced | 14 hours

This course gives you the background needed to gain Cybersecurity skills as part of the IBM Cybersecurity Professional Certificate programs. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization. Finally, you will explore the costs of data breaches through research studies and well known breaches. This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course. This course is intended for anyone who wants to explore examples of Cybersecurity breaches to work in the Cybersecurity field as a Cybersecurity Analyst or a Cybersecurity Specialist. The completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge. In this course, you will learn to: ● Apply incident response methodologies. ● Research and describe a watering hole attack. ● Research and describe ransomware threats and the consequences to organization. ● Research and describe 3rd party breaches and how they affect an organization. ● Research and describe the effects of a phishing attack. ● Research and describe a point of sale attack and approximate cost of data breaches. ● Perform a case study on a current cyber attack and breach.
Cybersecurity Assessment: CompTIA Security+ & CYSA+

INTERMEDIATE | Information Technology | Self-paced | 13 hours

Forbes specifically recommends the CompTIA Security+ certification for career starters seeking to validate their cybersecurity skills. Many job roles require CompTIA Security + and CySA+ certifications, and certified applicants catch the eye of employers (CompTIA)! During this two-week intensive short course, you’ll prepare for both the foundational CompTIA Security+ and advanced CySA+ exams. First, explore the vital CompTIA Security+ exam details, including exam eligibility, the five exam domains, tips for effective study, and additional exam preparation resources. Then, explore the CompTIA CYSA+ exam structure with four exam domains, exam eligibility, study strategies, and recommendations for extra study resources. For both certification exams, assess your readiness using ungraded practice tests. Prepare for the “day of” texting experience with the rigorous, full-length, realistically-timed mock exams and optimize your exam-day performance. When you’re ready for the next steps, use the links provided to purchase your exam voucher and schedule your exam. Kickstart your cybersecurity career with the certifications employers look for, and ENROLL TODAY!
Generative AI: Boost Your Cybersecurity Career

INTERMEDIATE | Information Technology | Self-paced | 10 hours

This short course provides cybersecurity professionals and enthusiasts with the latest Generative AI tools to address complex cybersecurity challenges. The course focuses on combating the exploitation of undetected vulnerabilities for which organizations increasingly turn to Artificial Intelligence (AI) and Machine Learning (ML). Generative AI, a transformative technology, emerges as a vital cybersecurity tool, detecting and preventing attacks by identifying and neutralizing unknown vulnerabilities before causing significant harm. The course explores foundational generative AI principles and their application in real-world cybersecurity, encompassing User and Entity Behavior Analytics (UEBA), threat intelligence, report summarization, playbooks, and its impact on phishing, malware, misinformation, and deepfakes. Additionally, participants learn about potential Natural Language Processing (NLP) attack techniques, like prompt injection, and strategies to mitigate them. The course ensures learners stay updated on the latest trends in using generative AI for cyber defense and threat prediction. Throughout the course you will be able to apply your knowledge with hands-on labs. Additionally, real-world inspired exercises will help you practice what you have learned. This course is suitable for both existing cybersecurity professionals who want to enhance their careers, as well as those aspiring to start a career in this field, such as cybersecurity specialists, cybersecurity analysts, cybersecurity engineers, and so on. Cybersecurity skills and basic generative AI knowledge is beneficial for this course.
Cybersecurity Job Search, Resume, and Interview Prep

BEGINNER | Information Technology | Self-paced | 11 hours

With the digital and AI disruption, cybersecurity professionals are in even higher demand around the world, and the trend shows no sign of slowing. There are also several great candidates. How can you get the edge in such a competitive field? This course will prepare you to enter the job market as a great candidate for an entry-level cybersecurity position. You will be equipped with practical techniques to create job-related documents, such as a resume, a portfolio, a cover letter, and an elevator pitch. You will learn how to find and assess prospective job positions, apply to them, and lay the groundwork for interviewing. You will learn about the different types of questions typically asked during cybersecurity interviews and witness mock interviews. Throughout this four-module self-paced course, you will hear from various cybersecurity experts who discuss their own career paths and talk about what they have learned about networking, interviewing, solving coding problems, and fielding other questions you may encounter as a candidate. You will also have the opportunity to practice what you learn and test your understanding. Come join us on this job search journey!

Complete This Certificate. Get College Credit.

You know that skill-specific courses will open the door to specialized jobs, but did you know that they will also move you closer to a degree at Franklin University?

The University has evaluated hundreds of certifications for industry-recognized proficiencies and awards credit that equates to specific Franklin courses, as well as technical- or elective-credit requirements. See how much time and money you'll save toward your degree by building on prior learning credit.

Browse & Filter

Degree Type
Program Type



Bolster Your Professional Skills

Take back control or rethink your career by strengthening your skills with a Professional Certificate through Franklin. Learn, hone or master job-related skills with professional development classes that won't break the bank or gobble up your free time. These online courses let you feed your curiosity and develop new skills that have real value in the workplace. Learn at your own pace. Cancel your subscription anytime.

Showcase Your Capabilities

Through Franklin’s partnership with Coursera, Certificate courses let you apply your learnings and build a career portfolio that helps demonstrate your professional capabilities to employers. Whether you're moving into a new field or progressing in your current one, the hands-on projects offer real-world examples that help illustrate your skills and abilities. Project completion is required to earn your Certificate.

Gain a Competitive Advantage

Get noticed by hiring managers and by your network of professional connections when you add a Professional Certificate to your credentials. Many Certificates are step toward full certification while others are the start of a new career journey. At Franklin, your Certificate also may be evaluated for course credit if you decide to enroll in one of our many degree programs.

Frequently Asked Questions

How much does the IBM Cybersecurity Analyst Professional Certificate cost?

When you enroll in this self-paced certificate program, you decide how quickly you want to complete each of the courses in the specialization. To access the courses, you pay a small monthly cost of $35, so the total cost of your Professional Certificate depends on you. Plus, you can take a break or cancel your subscription anytime.

How long does it take to finish the IBM Cybersecurity Analyst Professional Certificate?

It takes about 4-5 months to finish all the courses and hands-on projects to earn your certificate.

What prior experience do I need to enroll?

No prior experienced is needed for this beginner-level series. Enroll now.

What will I be able to do with my IBM Cybersecurity Analyst Professional Certificate?

Share your certificate with your professional network to demonstrate your cybersecurity know-how. Use this certificate as a launch pad for a new career in information security, including a job as a cybersecurity analyst.

Do I need to apply and be accepted as a Franklin University student to take courses offered through the FranklinWORKS Marketplace?

No. Courses offered through the Marketplace are for all learners. There is no application or admission process.

If I complete a certificate and decide to enroll at Franklin, how do I get course credit toward a degree?

Please submit your certificate to plc@franklin.edu for review and processing. After your official evaluation has been completed, please review it to ensure that all eligible credits have been applied. 

You can submit documentation before or after you apply to Franklin.



5-6
Months to Complete

Shareable Certificate

Earn a certificate upon completion

100% Online

Start instantly and learn on your own schedule

Flexible

Set timelines that are convenient for you

Intermediate Level

For learners who want to build on existing skills

Login

Returning User

Have you taken Franklin courses previously? If so, you can log in with your existing credentials:

LOG IN

If you have an account but do not know your username or password, you can recover them here:

ACCOUNT RECOVERY

New User

The email address you entered is already associated with a Franklin account.

Please LOG IN in the Returning User area.

If you have an existing account with Franklin University but are unable to log in, you can recover a lost or forgotten username/password with the ACCOUNT RECOVERY button.

If you believe this to be in error, or if you are unable to use your existing Franklin account credentials, please contact the Franklin University Helpdesk for assistance.

Pay Now to Enroll in Coursera Programs!

For $49 per month, you will receive unlimited access to the full catalog of programs offered through Franklin University's partnership with Coursera.

Learn at your own pace, and cancel your subscription at any time.

IBM Cybersecurity Analyst Certificate Online

Total $0

We do not refund payment for online courses or programs. If you purchased an online course and it is not what you expected, please contact us at FWMarketplace@franklin.edu to share your constructive feedback.

Ask A Question

Partnership and Group Discounts

If you are with an organization looking to upskill your workforce, discounted group pricing is available. Please contact:

Whitney Iles
Director of Partnerships and Client Management
whitney.iles@franklin.edu
614.947.6702

Additional Options

If you can't find what you're looking for, additional options may be available. Please contact:

David Kerr
Strategic Alliances Systems & Operations Director
FWMarketplace@franklin.edu
614.947.6079

How It Works

  1. Create Your Account

    Sign up with just your name, email, and phone number. This will let you log in and save your favorite programs as you browse our offerings, as well as access any products you purchase.

  2. Pay Now to Enroll

    Some programs are included as part of our $49 monthly subscription, while others are priced on an individual basis. Select what works for you and pay through our fast, simple, and secure payment portal.

  3. Start Learning

    Choose from our self-paced offerings to work on your own schedule, or select instructor-led courses for a more traditional experience.

  4. Share

    Share the certificates, badges, and credentials you earn to put your new skills to work for you.

How It Works

  1. Sign Up

    Provide your name, email and phone number to start learning more about MedCerts and get connected to a personal education consultant.

  2. Meet Your Education Consultant

    Enroll in your ideal program based on your career goals. We'll help you determine the best path & payment plan for you.

  3. Start Learning

    Utilize our immersive learning & dynamic exam prep. Get guidance and motivation from your personal Student Success Advisor.

  4. Get Certified

    Use your newly learned knowledge to take your certification exam & gain national credentials.

Partner Console

Your changes were successfully submitted