Skip to main content

IBM: Cybersecurity Capstone and Case Studies

Research real-world data breaches and explore different incident response methodologies and security models. This course is part of the IBM Cybersecurity Analyst Professional Certificate!

Cybersecurity Capstone and Case Studies
6 weeks
3–4 hours per week
Progress at your own speed
Optional upgrade available

There is one session available:

After a course session ends, it will be archivedOpens in a new tab.
Starts Feb 20
Ends Jun 30

About this course

Skip About this course

Throughout this course, you will delve into incident response methodologies and security models through case studies, equipping yourself with effective strategies for handling security incidents. You will also learn to identify and categorize various types of vulnerabilities and associated attacks commonly faced by modern organizations.

You will explore several past and recent breaches in-depth and analyze how they were detected and evaluate potential mitigation strategies to reduce threat risks to organizations. Furthermore, this course will provide insights into the costs of data breaches through comprehensive research studies and renowned breach case studies.

As part of the course requirements, you will select a cybersecurity breach from current news and apply your knowledge and skills gained from this course and previous cybersecurity courses to conduct a detailed analysis. This project will be evaluated and graded by your peers in this course.

Enroll in this course today in order to establish the necessary foundation for developing cybersecurity expertise as part of the IBM Cybersecurity Analyst Professional Certificate program.

At a glance

  • Institution: IBM
  • Subject: Computer Science
  • Level: Intermediate
  • Prerequisites:

    It is recommended that you complete the previous courses in the IBM Cybersecurity Analyst Professional Certificate before taking this course!

  • Language: English
  • Video Transcripts: اَلْعَرَبِيَّةُ, Deutsch, English, Español, Français, हिन्दी, Bahasa Indonesia, Português, Kiswahili, తెలుగు, Türkçe, 中文
  • Associated programs:

What you'll learn

Skip What you'll learn
  • Analyze threats and breaches and determine their consequences to an organization
  • Explore phishing scams and their implications on organizations
  • Discuss how to approximate the cost of a data breach
  • Research a recent cyber-attack and recognize the data breaches and vulnerabilities for a specific company

Module 1: Incident Management Response and Cyberattack Frameworks

Module 2: Phishing Scams

Module 3: Point of Sale Breach

Module 4: Third Party Breach

Module 5: Ransomware

Module 6: Apply your Skill – Data Breaches

Who can take this course?

Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

This course is part ofCybersecurity Analyst Professional Certificate Program

Learn more 
Expert instruction
8 skill-building courses
Progress at your own speed
9 months
3 - 5 hours per week

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.