
Overview

Coursera Plus Annual Sale:
All Certificates & Courses 50% Off!
Grab it
Getting ISC2 Certified in Cybersecurity (CC) is the ideal way to start your cybersecurity career. This program gives you the knowledge you need to pass the CC certification exam and get your first job. No previous experience is required, and it proves to employers you have the fundamental cybersecurity skills they’re looking for.
Cybersecurity specialists help protect the security of an organization’s infrastructure, network, applications, and data. During this program, you’ll look at IT essentials, including hardware, operating systems, and software. You’ll learn how networks operate, troubleshoot connectivity issues, and secure data storage systems. Plus, you’ll explore cloud computing.
You’ll then dive into cybersecurity, learning to protect against threats like phishing and hacking, and explore security principles, incident response, and disaster recovery planning. You’ll gain practical experience with access controls, network security, and breach response. And you’ll complete a capstone project analyzing a real-world cybersecurity breach; great experience for interviews!
Once you’ve completed the program, you’ll be fully prepared for the ISC2 Certified in Cybersecurity exam. PLUS, you’ll have a professional certificate and digital credential from IBM!
If you’re keen to landyour first role as a cybersecurity specialist in just 4 months, enroll today!
Syllabus
Course 1: Introduction to Cybersecurity Careers
- Offered by IBM and ISC2. There is a great demand for cybersecurity professionals and expected to continue into the foreseeable future. Thus ... Enroll for free.
Course 2: Introduction to Hardware and Operating Systems
- Offered by IBM and ISC2. Get ready to enter the thriving field of Information Technology (IT), with job ready skills! This beginner friendly ... Enroll for free.
Course 3: Introduction to Software, Programming, and Databases
- Offered by IBM and ISC2. Take the next step in your IT professional journey with this self-paced, beginner friendly course! This course ... Enroll for free.
Course 4: Introduction to Networking and Storage
- Offered by IBM and ISC2. Jumpstart your career in Information Technology (IT) with this beginner friendly, self-paced course! By taking this ... Enroll for free.
Course 5: Introduction to Cloud Computing
- Offered by IBM and ISC2. Start your cloud computing journey with this self-paced introductory course! Whether you need general cloud ... Enroll for free.
Course 6: Introduction to Cybersecurity Essentials
- Offered by IBM and ISC2. With this beginner friendly course, learn fundamental Cybersecurity skills that are crucial for anyone using ... Enroll for free.
Course 7: Security Principles
- Offered by IBM and ISC2. Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the ... Enroll for free.
Course 8: Incident Response, BC, and DR Concepts
- Offered by IBM and ISC2. Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on ... Enroll for free.
Course 9: Access Control Concepts
- Offered by IBM and ISC2. Welcome to course 3 of 5 of this Specialization, Access Control Concepts. In Course 1, we introduced access ... Enroll for free.
Course 10: Network Security
- Offered by IBM and ISC2. Welcome to course 4 of 5 of this Specialization, Network Security. In this course, we will look at computer ... Enroll for free.
Course 11: Security Operations
- Offered by IBM and ISC2. Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the ... Enroll for free.
Course 12: Cybersecurity Case Studies and Capstone Project
- Offered by IBM and ISC2. Gain the real-world experience of cybersecurity analysis employers look for with this hands-on capstone course. In ... Enroll for free.
- Offered by IBM and ISC2. There is a great demand for cybersecurity professionals and expected to continue into the foreseeable future. Thus ... Enroll for free.
Course 2: Introduction to Hardware and Operating Systems
- Offered by IBM and ISC2. Get ready to enter the thriving field of Information Technology (IT), with job ready skills! This beginner friendly ... Enroll for free.
Course 3: Introduction to Software, Programming, and Databases
- Offered by IBM and ISC2. Take the next step in your IT professional journey with this self-paced, beginner friendly course! This course ... Enroll for free.
Course 4: Introduction to Networking and Storage
- Offered by IBM and ISC2. Jumpstart your career in Information Technology (IT) with this beginner friendly, self-paced course! By taking this ... Enroll for free.
Course 5: Introduction to Cloud Computing
- Offered by IBM and ISC2. Start your cloud computing journey with this self-paced introductory course! Whether you need general cloud ... Enroll for free.
Course 6: Introduction to Cybersecurity Essentials
- Offered by IBM and ISC2. With this beginner friendly course, learn fundamental Cybersecurity skills that are crucial for anyone using ... Enroll for free.
Course 7: Security Principles
- Offered by IBM and ISC2. Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the ... Enroll for free.
Course 8: Incident Response, BC, and DR Concepts
- Offered by IBM and ISC2. Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on ... Enroll for free.
Course 9: Access Control Concepts
- Offered by IBM and ISC2. Welcome to course 3 of 5 of this Specialization, Access Control Concepts. In Course 1, we introduced access ... Enroll for free.
Course 10: Network Security
- Offered by IBM and ISC2. Welcome to course 4 of 5 of this Specialization, Network Security. In this course, we will look at computer ... Enroll for free.
Course 11: Security Operations
- Offered by IBM and ISC2. Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the ... Enroll for free.
Course 12: Cybersecurity Case Studies and Capstone Project
- Offered by IBM and ISC2. Gain the real-world experience of cybersecurity analysis employers look for with this hands-on capstone course. In ... Enroll for free.
Courses
-
Start your cloud computing journey with this self-paced introductory course! Whether you need general cloud computing knowledge for school or business, or you are considering a career change, this beginner-friendly course is right for you. In this course you’ll learn about essential characteristics of cloud computing and emerging technologies supported by cloud. You’ll explore cloud service models, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Public, Private, and Hybrid deployment models. Discover the offerings of prominent cloud service providers AWS, Google, IBM, Microsoft, and others, and review cloud computing case studies. Learn about cloud adoption, blockchain, analytics, and AI. You will learn about the many components of cloud computing architecture including datacenters, availability zones, virtual machines, containers, and bare metal servers. You will also familiarize yourself with different types of cloud storage options, such as Object Storage. You’ll gain foundational knowledge of emergent cloud trends and practices including Hybrid, Multicloud, Microservices, Serverless, DevOps, Cloud Native, Application Modernization, as well as learn about cloud security and monitoring. You’ll also explore cloud computing job roles and possible career paths and opportunities. You will complete a number of labs and quizzes throughout this course to increase your understanding of course content. At the end of the course, you will complete a final project where you will deploy an application to Cloud using a serverless architecture, a valuable addition to your portfolio. After this course, check out the related courses to help you towards your new career as a cloud engineer, full stack developer, DevOps engineer, cybersecurity analyst, and others.
-
Gain the real-world experience of cybersecurity analysis employers look for with this hands-on capstone course. In this course, you’ll analyze real-life breach response case studies in areas such as phishing, vishing, point of sale (PoS) breaches, insider threats, AI-related breaches, and ransomware attacks. You’ll discover how attackers exploit vulnerabilities and how organizations respond and prevent future incidents. Additionally, you’ll gain expertise in incident response, digital forensics, penetration testing, and compliance through engaging case study analysis. You’ll complete several hands-on activities to assess response strategies and propose improvements. The course concludes with a final project, where you’ll select a real-world data breach, identify vulnerabilities, and assess the root cause, actions taken, and response strategies. Plus, a structured template will guide you to critically record observations and propose actionable improvements for breach management. This capstone course is a fantastic experience to talk about in interviews! If you’re keen to add practical cybersecurity experience to your resume, enroll today to complete this valuable capstone project in just six weeks!
-
Take the next step in your IT professional journey with this self-paced, beginner friendly course! This course covers the basics of software, cloud computing, web browsers, application development concepts, programming languages, and database fundamentals. You will first be introduced to computing platforms and software applications. You’ll learn about the software lifecycle, software compatibility across different platforms, and software versioning. You'll also learn about installing and managing web browsers, using extensions and plug-ins, and keeping them secure and updated. Next you will learn about basic programming concepts, coding logic, and the different programming languages like Python. You’ll move on to data and database fundamentals and learn how to use, interface with, access and backup databases. After completing this course, you'll have a better grasp of software processes and feel more confident about using and securing applications. From mobile phone operating systems to workplace database applications, this course covers a wide range of software. Discover the benefits of cloud-based technologies and see how using the cloud can help businesses create and deploy applications faster. To solidify your understanding and put your skills to the test, the course includes numerous hands-on labs. It ends with a final project where you’ll showcase your newfound expertise and demonstrate your understanding of software, programming, and databases. Enroll now to take the next step in developing expertise in IT Fundamentals.
-
Get ready to enter the thriving field of Information Technology (IT), with job ready skills! This beginner friendly course provides the core hardware and operating system knowledge needed by anyone new to IT and computer hardware who wants to start a new career in technology, including IT Support, Networking, Cybersecurity, and Software Development. You will first be introduced to computing fundamentals, the four functions of computing, and the benefits of computing. You will become knowledgeable of internal computer components, including motherboards, central processing units (CPUs), memory, hard drives, expansion slots, and others. Learn to identify interfaces, ports, connectors, and peripherals. You will become familiar with tasks that IT professionals perform; including workstation procurement, workstation setup processes, configure commonly used operating system settings & screen capture commands, computer acquisition practices, and job-essential troubleshooting processes. By the end of this course, you will become knowledgeable about hardware and operating systems, mobile operating systems, interfaces and connectors, Linux, and macOS. Throughout the course you will practice what you learn using interactive exercises and hands-on labs. At the end of the course, you will have the opportunity to complete a final project where you will apply your understanding of course content. This course is also part of the series to help you prepare for CompTIA ITF+ and A+ certification exams.
-
With this beginner friendly course, learn fundamental Cybersecurity skills that are crucial for anyone using computing devices and connecting to the Internet. You will first learn to recognize common security threats and risks that individuals and organizations may face, such as theft, tampering, and destruction of sensitive information. You’ll then discover the characteristics of cyber-attacks and learn how you can employ best practices to guard against them. Next, you’ll learn about the best practices against cyberattacks. These include using strong passwords, good password management, and multi-factor authentication. You’ll learn ways in which you can strengthen your security plan with techniques like device hardening, encryption and more. You’ll then learn about safe browsing practices. You’ll gain an understanding of why you must practice safe browsing; to protect yourself against hackers, phishing, identity theft, security leaks, privacy issues and more. You’ll also explore methods for securing and managing confidential information. Then, discover how to configure browsers to help reduce security breaches. Throughout this course you will complete many hands-on labs which will enhance your understanding of course material. At the end of this course, you will have the opportunity to complete a final project where you will demonstrate your proficiency in cybersecurity. Designed specifically for beginners and those who are interested in a Cybersecurity Specialist or Analyst roles as well as entry-level roles in Information Security (Infosec) engineering. This course dives into the world of cybersecurity to give you the critical skills employers need. It also supports the needs of technical and IT support roles, who can find themselves on the front lines of defense for cybersecurity issues.
-
Jumpstart your career in Information Technology (IT) with this beginner friendly, self-paced course! By taking this course you will enhance your base knowledge of essential skills in networking, storage, and system administration. You'll first learn about networking fundamentals which include: network types, network cables, topologies, and models. Understand how data travels across a network, and discover how protocols and standards enable all network activity. Then, you’ll learn how to set up and configure devices and cables for both wired and wireless networks. Next, you’ll learn to diagnose and troubleshoot network connectivity issues and discover how to use command line utilities and network tools in Windows settings. After that, you’ll identify different types of storage drives and discover the difference between short-term and long-term memory. You’ll learn the features of local, offsite, and cloud storage and when to use each. And you’ll investigate file, block, and object storage and work out which cloud provider solutions work best for different networking scenarios. Videos, practice activities, and virtual hands-on labs will help you develop and apply the skills you need to diagnose and repair basic networking and storage issues so you can keep users connected and their data accessible. At the end of this course, you will complete a final quiz and assignment where you will demonstrate your understanding of the course content.
-
Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the participant will be able to:  Discuss the foundational concepts of cybersecurity principles. - Recognize foundational security concepts of information assurance. - Define risk management terminology and summarize the process. - Relate risk management to personal or professional practices. - Classify types of security controls. - Distinguish between policies, procedures, standards, regulations and laws. - Demonstrate the relationship among governance elements. - Analyze appropriate outcomes according to the canons of the ISC2 Code of Ethics when given examples. - Practice the terminology and review security principles. Agenda Course Introduction Module 1: Information Assurance Module 2: Risk Management Process Module 3: Security Controls Module 4: Governance Module 5: ISC2 Code of Ethics Module 6: Course Summary This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.
-
Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties. After completing this course, the participant will be able to:  Explain concepts of security operations. - Discuss data handling best practices. - Identify important concepts of logging and monitoring. - Summarize the different types of encryption and their common uses. - Describe the concepts of configuration management. - Explain the application of common security policies. - Discuss the importance of security awareness training. - Practice the terminology of and review the concepts of network operations. Agenda Course Introduction Module 1: Understanding Data Security and Encryption Module 2: Controls and Asset Management Module 3: Best Practice Security Policies Module 4: Understand Security Education Training and Awareness (SETA) Module 5: Security Operations Review Final Assessment This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.
-
Welcome to course 4 of 5 of this Specialization, Network Security. In this course, we will look at computer networking and securing the network. In today’s world, the internet connects nearly everyone and everything, and this is accomplished through networking. While most see computer networking as a positive, criminals routinely use the internet, and the networking protocols themselves, as weapons and tools to exploit vulnerabilities and for this reason we must do our best to secure the network. We will review the basic components of a network, threats and attacks to the network, and learn how to protect them from attackers. Network security itself can be a specialty career within cybersecurity; however, all information security professionals need to understand how networks operate and are exploited to better secure them. After completing this chapter, the participant will be able to:  Explain the concepts of network security. - Recognize common networking terms and models. - Identify common protocols and ports and their secure counterparts. - Identify types of network (cyber) threats and attacks. - Discuss common tools used to identify and prevent threats. - Identify common data center terminology. - Recognize common cloud service terminology. - Identify secure network design terminology. - Practice the terminology of and review network security concepts. Agenda Course Introduction Module 1: Network Concepts and Models Module 2: Common Network Threats and Attacks Module 3: Network Security Infrastructure Module 4: Network Security Review This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.
-
Welcome to course 3 of 5 of this Specialization, Access Control Concepts. In Course 1, we introduced access control concepts. Now, we will take a more detailed look at the types of access control that every information security professional should be familiar with. We will discuss both physical and logical controls and how they are combined to strengthen the overall security of an organization. This is where we describe who gets access to what, why access is necessary, and how that access is managed. After completing this course, the participant will be able to:  Select access controls that are appropriate in a given scenario. - Relate access control concepts and processes to given scenarios. - Compare various physical access controls. - Describe logical access controls. - Practice the terminology of access controls and review concepts of access controls. Agenda Course Introduction Module 1: Key Concepts Module 2: Administrative Controls Module 3: Physical Controls Module 4:Logical Controls Module 5: Controls Review This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.
-
Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans. While these three plans may seem to overlap in scope, they are three distinct plans that are vital to the survival of any organization. After completing this course, the participant will be able to:  Explain how organizations respond to, recover from and continue to operate during unplanned disruptions. - Recall the terms and components of incident response. - Summarize the components of a business continuity plan. - Identify the components of disaster recovery. - Practice the terminology of and review incident response, business continuity and disaster recovery concepts. Agenda Course Introduction Module 1: Incident Response (IR) Module 2: Business Continuity (BC) Module 3: Disaster Recovery (DR) Module 4: Incident Response, Business Continuity, and Disaster Recovery Review This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.
-
There is a great demand for cybersecurity professionals and expected to continue into the foreseeable future. Thus making it the right time to launch into a cybersecurity career. This course gives an insight into the various career options in cybersecurity. It is designed to give you the knowledge required to find and secure the right career for you in the information security (Infosec) industry. The course begins by addressing the widening employment gap in cybersecurity, detailing the various roles and responsibilities associated with different career levels. You will learn the importance of both technical and soft skills, providing a balanced approach to professional development. In addition, you will also become familiar with the most recognized certifications in the field provided by organizations such as CompTIA, ISC2 like A+ and CISSP and so on. Throughout this course you will hear from several cybersecurity experts sharing their insights and experiences on how to start a career in cybersecurity. This course is suitable for anyone who aspires to launch a rewarding career in cybersecurity. It does not require any prior degree or cybersecurity background.
Taught by
(ISC)² Education & Training, Dee Dee Collette, IBM Skills Network Team and Rav Ahuja