Online Course – Certified Professional Internship in Security Analysis with Google and IBM by IBM

Start your career in cyber. Acquire the knowledge required to work as a cyber analyst.

Suggested by: Coursera (What is Coursera?)

Professional Certificate

Beginners

No prior knowledge required

Time to complete the course

7-day free trial

No unnecessary risks

Skills you will acquire in the course

  • Information Security Incident Management
  • Data leak
  • Threat Intelligence
  • Digital exploration
  • Cyber ​​Analyst

What you will learn in the course

Courses for which the course is suitable

  • Cybersecurity Analyst
  • Information Security Architect
  • Cybersecurity Engineer
  • Penetration Testing Specialist
  • Digital analyzer
  • Threat intelligence gathering specialist
  • Incident Response Manager
  • Hacking analysis expert

Internship – 3-part course series

There are more and more exciting and lucrative jobs in today’s security industry that don’t require a traditional college degree. According to Forbes, there will be nearly 3.5 million job openings in the industry across a wide range of fields by 2021! One role that is experiencing a severe skill shortage is cybersecurity analyst.

What will you learn during the internship?

  • Concepts related to digital analytics
  • Penetration testing
  • Response to events
  • Gathering threat intelligence
  • Data collection tools designed to prevent attacks or help in the event that your organization is compromised

Opportunities during the internship

You will have the opportunity to go through some of the biggest hacks and try to report a hack from the real world. The content creators and guides are:

  • Architects
  • Security Operations Center (SOC) analysts
  • Renowned engineers

They work in cybersecurity in their daily lives at IBM, with a global perspective. They will share the skills needed to secure IBM and its clients’ security systems.

The digital symbol

Completing this specialization also gives you the opportunity to earn the IBM “System Analyst Fundamentals” digital credential. More information about the credential can be found at the following website: Security Analyst Credential

Hands-on Learning Project

During the program, you will use virtual labs and websites that will provide you with practical skills with relevance to real jobs that employers value, including:

  • Tools: For example, Wireshark, IBM QRadar, IBM MaaS360, IBM Guardium, IBM Resilient, i2 Enterprise Insight
  • Labs: SecurityLearningAcademy.com
  • Libraries: Python
  • Projects: Researching a practical security breach, we will discuss the attack, vulnerabilities, costs, and prevention recommendations at the investigation table.

Details of the courses that make up the specialization

Penetration testing, threat hunting, and cryptography

Course 1

  • 16 hours
  • 4.6 (2,359 ratings)
Course Details
What will you learn?
  • Penetration and threat hunting capabilities are in demand, supported by practical practice, which is what employers look for in resumes.
  • Practical experience in implementing penetration testing principles using tools such as OWASP ZAP and SNYK.
  • How to prepare penetration testing reports and integrate artificial intelligence to perform advanced threat hunting and threat intelligence gathering.
  • Using cryptography and cryptanalysis techniques such as encryption and SHA hashing to ensure data integrity and privacy.
Skills you will gain
  • Category: Cyber ​​Security
  • Category: Cyber ​​Threat Intelligence
  • Category: Cryptography
  • Category: Penetration Testing
  • Category: Cyber ​​Threat Search

Course 2

  • 5 hours
  • 4.7 (1,772 ratings)
Course Details
What will you learn?
  • Explain the principles and importance of incident response in cybersecurity.
  • Implement techniques for detecting and analyzing security events.
  • Apply methods for collecting and examining digital data.
  • Analyze and report digital forensics findings to support cybersecurity efforts.
Skills you will gain
  • Category: Incident Response
  • Category: Digital Evidence Handling
  • Category: Security Analysis and Reporting
  • Category: Cyber ​​Incident Management
  • Category: Digital Forensics

Cybersecurity Final Course: Breach Response Cases

Course 3

  • 13 hours
  • 4.8 (1,457 ratings)
Course Details
What will you learn?
  • This course provides you with the knowledge required to acquire cybersecurity skills as part of IBM professional certification programs. You will explore incident response methodologies and security models.
  • You will learn to identify and classify types of vulnerabilities and major attacks against organizations today.
  • You will delve into various security breaches from the past and present to learn how they were discovered and what was done or could have been done to reduce the threat risk to the organization.
  • Finally, you will explore the costs of data breaches through research and known vulnerabilities.
project
  • This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, timeline of the attack, vulnerable systems, and any missed opportunities.
  • This project will be graded by your peers in the course.
Target audience
  • The course is designed for anyone who wants to investigate examples of cybersecurity breaches in order to work in the cybersecurity field as an analyst or security specialist.
Certification
  • Completing this course also entitles you to receive the IBM Digital Badge for the Cybersecurity: Breach Response Course.
In this course you will learn:
  • Implement incident response methodologies.
  • Investigate and describe a “running water” attack.
  • Investigate and describe ransomware threats and their implications for the organization.
  • Investigate and describe breaches by third parties and how they impact an organization.
  • Investigate and describe the effects of a phishing attack.
  • Investigate and describe a point-of-sale attack and the cost associated with data breaches.
  • Conduct a case study on a current cyber attack and breach.
Skills you will gain
  • Category: Computer Security Incident Management
  • Category: Cyber ​​Security
  • Category: Breach (Security Exploit)
  • Category: Security Analyst
  • Category: Cyber ​​Attack