IBM and ISC2 Cybersecurity Specialist Professional Certificate Course Syllabus

Full curriculum breakdown — modules, lessons, estimated time, and outcomes.

Overview: This IBM and (ISC)² co-developed Professional Certificate provides a comprehensive foundation in cybersecurity, designed for beginners aiming to enter the field. The program spans approximately 28–35 weeks of part-time study and covers essential technical and governance topics aligned with the (ISC)² Certified in Cybersecurity (CC) exam objectives. Learners gain hands-on experience with IBM security tools and explore key domains including network security, identity management, risk compliance, cloud security, and incident response. The curriculum concludes with a capstone project simulating a real-world security incident.

Module 1: Cybersecurity Fundamentals

Estimated time: 20 hours

  • Understanding the cybersecurity landscape and threat actors
  • Identifying common attack vectors and defense mechanisms
  • Exploring security frameworks: NIST and ISO 27001
  • Analyzing real-world data breaches and security governance principles

Module 2: Network Security Essentials

Estimated time: 25 hours

  • Designing secure network architectures
  • Configuring firewalls and intrusion detection systems
  • Implementing VPN solutions and network segmentation
  • Applying zero trust security principles

Module 3: Identity & Access Management

Estimated time: 20 hours

  • Implementing multi-factor authentication and role-based access control
  • Managing directory services and privileged access
  • Configuring identity providers using IBM Security Verify
  • Auditing access logs and access control policies

Module 4: Risk Management & Compliance

Estimated time: 25 hours

  • Conducting security risk assessments
  • Selecting and implementing security controls
  • Understanding compliance frameworks: GDPR, HIPAA, PCI-DSS
  • Developing business continuity and disaster recovery plans

Module 5: Cloud Security Fundamentals

Estimated time: 20 hours

  • Securing hybrid and cloud-native environments
  • Implementing cloud security posture management
  • Configuring IBM Cloud security services
  • Analyzing cloud-specific threats and SaaS security

Module 6: Incident Response Capstone

Estimated time: 30 hours

  • Conducting threat analysis using NIST SP 800-61 guidelines
  • Developing containment and eradication strategies
  • Documenting incident response and lessons learned

Prerequisites

  • Basic computer literacy
  • Familiarity with internet technologies
  • No prior cybersecurity experience required

What You'll Be Able to Do After

  • Apply foundational cybersecurity principles in real-world scenarios
  • Configure and manage core security technologies including firewalls and IAM systems
  • Assess and manage security risks in alignment with compliance standards
  • Implement security controls in cloud and network environments
  • Respond to cybersecurity incidents using structured frameworks
View Full Course Review

Course AI Assistant Beta

Hi! I can help you find the perfect online course. Ask me something like “best Python course for beginners” or “compare data science courses”.