IBM and ISC2 Cybersecurity Specialist Professional Certificate Course Syllabus
Full curriculum breakdown — modules, lessons, estimated time, and outcomes.
Overview: This IBM and (ISC)² co-developed Professional Certificate provides a comprehensive foundation in cybersecurity, designed for beginners aiming to enter the field. The program spans approximately 28–35 weeks of part-time study and covers essential technical and governance topics aligned with the (ISC)² Certified in Cybersecurity (CC) exam objectives. Learners gain hands-on experience with IBM security tools and explore key domains including network security, identity management, risk compliance, cloud security, and incident response. The curriculum concludes with a capstone project simulating a real-world security incident.
Module 1: Cybersecurity Fundamentals
Estimated time: 20 hours
- Understanding the cybersecurity landscape and threat actors
- Identifying common attack vectors and defense mechanisms
- Exploring security frameworks: NIST and ISO 27001
- Analyzing real-world data breaches and security governance principles
Module 2: Network Security Essentials
Estimated time: 25 hours
- Designing secure network architectures
- Configuring firewalls and intrusion detection systems
- Implementing VPN solutions and network segmentation
- Applying zero trust security principles
Module 3: Identity & Access Management
Estimated time: 20 hours
- Implementing multi-factor authentication and role-based access control
- Managing directory services and privileged access
- Configuring identity providers using IBM Security Verify
- Auditing access logs and access control policies
Module 4: Risk Management & Compliance
Estimated time: 25 hours
- Conducting security risk assessments
- Selecting and implementing security controls
- Understanding compliance frameworks: GDPR, HIPAA, PCI-DSS
- Developing business continuity and disaster recovery plans
Module 5: Cloud Security Fundamentals
Estimated time: 20 hours
- Securing hybrid and cloud-native environments
- Implementing cloud security posture management
- Configuring IBM Cloud security services
- Analyzing cloud-specific threats and SaaS security
Module 6: Incident Response Capstone
Estimated time: 30 hours
- Conducting threat analysis using NIST SP 800-61 guidelines
- Developing containment and eradication strategies
- Documenting incident response and lessons learned
Prerequisites
- Basic computer literacy
- Familiarity with internet technologies
- No prior cybersecurity experience required
What You'll Be Able to Do After
- Apply foundational cybersecurity principles in real-world scenarios
- Configure and manage core security technologies including firewalls and IAM systems
- Assess and manage security risks in alignment with compliance standards
- Implement security controls in cloud and network environments
- Respond to cybersecurity incidents using structured frameworks