Cyber Security

Today many organizations across all industries are faced with unmanageable levels of cyber threats brought on by the changing threat landscape, the risk of exposure, and an evergrowing attack surface. The optimum strategy to respond to this combination of factors is to make security an integral part of culture and overall structure—to help organizations better prepare for their digital transformation in the age of the fourth industrial revolution.

Next Course starts: Jan, 2020

Limited no. of seats available

Program Duration : 75 Hours

40 Hours Online / 35 Hours Lab

Online Bootcamp

Learning Format



Program Overview

This course comprises a unique mix of cybersecurity technical and real-world industry skills, brought to provide awareness on the impact of cybersecurity threats in key industries and geographies.

Cybersecurity Practitioners – Can elevate organizations’ overall security posture, by adopting practices, methods and tools that increase enterprise cyber resilience. Practitioners provide awareness on the latest cyber threats and can help set the foundations for the implementation of an incident response team and a security operations center.


Individuals with an active interest in applying for entry level jobs to work in cybersecurity related fields

Prerequisite skills for this course:


Analyze top targeted industries and annual trends.

Explore how cyber criminals are using operating system tools to get control.

Uncover why cyber criminals are changing their techniques to gain illegal profits

Determine what steps you can take to protect your organization against these threats.

Understand the tools used by penetration testers and ethical hackers such as: network CLI tools, Telnet, SSH, Nmap, Wireshark, and many others

Leveraging high-end security enterprise solutions in high demand such as: IBM QRadar SIEM, Vulnerability Manager, UBA, IBM QRadar Advisor with Watson, I2 Analyst Notebook and IBM Cloud X-Force Exchange.


IBM Program Advantage

IBM Training and certifications offers you the ability to earn credentials to demonstrate your expertise. It is designed to validate your skills and capability to perform role-related tasks and activities at a specified level of competence.


IBM has always believed that if you love what you do, and you have the skills to do it, you can change the way the world works. By developing revolutionary concepts in learning, IBM has made it easier and faster for you to develop the skills you need to succeed:

  • Easy access to digital learning content
  • Lab platforms providing hands-on labs and product sandboxes
  • Global Training Providers offer a robust schedule of IBM training offerings virtually or face to face
  • Digital credentials and certificate programs signal your readiness for emerging job roles


At the heart of our human-centered mission is a passion to solve the world's problems by building the skills you need most. Join us.

Learning Path

Module 1

Cyber Security Overview

  • Status quo of IT security
  • Security Intelligence and operations
  • Module 2

    Security Intelligence Foundations

  • Designing a Security Intelligence solution
  • Security Intelligence functional components
  • Module 3

    Security Intelligence Engineer

  • Collecting and processing events, flows, and vulnerability data
  • Investigating an offense that is triggered by events
  • Investigating the events of an offense
  • Using asset profiles to investigate offenses
  • Investigating an offense that is triggered by flows
  • False positives overview
  • Investigating superflows
  • Using rules and building blocks
  • Creating SIEM reports
  • Performing advanced filtering