Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Online Course

Cyber Threat Intelligence

IBM via Coursera

  • Provider Coursera
  • Cost Free Online Course (Audit)
  • Session In progress
  • Language English
  • Certificate Paid Certificate Available
  • Effort 29 hours worth of material
  • Duration 5 weeks long
  • Learn more about MOOCs

Taken this course? Share your experience with other students. Write review


This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program.

You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms.

This course also gives you hands on access to cybersecurity tools important to a system analyst.

This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the sixth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.

The completion of this course also makes you eligible to earn the Cyber Threat Intelligence IBM digital badge. More information about the badge can be found

Want to see if this is a good career fit for you? IBM is collaborating with MyInnerGenius, one of the world's leading assessment companies, to help you find out which careers in IT you will love -- careers that are a great match for you -- regardless of your education or experience -- even if you’ve never considered a role in IT.

In less than an hour, you will receive targeted recommendations for hot roles where you will excel and everything you need to get started. You can even earn IBM Digital Badges to show the world your skills!

Find out more

In this course, you will learn to:

• Describe examples of network defensive tactics.
• Discuss data loss prevention and endpoint protection concepts and tools.
• Explore a data loss prevention tool and learn how to classify data in your database environment.
• Describe security vulnerability scanning technologies and tools.
• Recognize application security threats and common vulnerabilities.
• Identify the key concepts around threat intelligence.
• Explore a SIEM product and review suspicious alerts and how to take action.


Threat Intelligence
-In this module you will investigate several threat intelligence resources.

Data Loss Prevention and Mobile Endpoint Protection
-In this module you will learn about data loss prevention tools and risks as well as managing mobile endpoints.

-In this module you will learn various scanning technologies and how they apply to cybersecurity.

Application Security and Testing
-In this module you will learn about application architecture, security and DevSecOps.

SIEM Platforms
-In this module you will learn about SIEM platforms and apply your knowledge.

Threat Hunting
-In this module, you will learn about threat hunting and how proactive threat hunting is used at a Security Operation Center or SOC.

Taught by

IBM Security Learning Services

Help Center

Most commonly asked questions about Coursera

Reviews for Coursera's Cyber Threat Intelligence Based on 0 reviews

  • 5 star 0%
  • 4 star 0%
  • 3 star 0%
  • 2 star 0%
  • 1 star 0%

Did you take this course? Share your experience with other students.

Write a review

Class Central

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free