Skip to main content

IBM: Threat Intelligence in Cybersecurity

Gain an understanding of network defensive tactics, network access controls, as well as network monitoring tools. This course is part of the IBM Cybersecurity Analyst Professional Certificate!

Threat Intelligence in Cybersecurity
6 weeks
5–6 hours per week
Self-paced
Progress at your own speed
Free
Optional upgrade available

There is one session available:

After a course session ends, it will be archivedOpens in a new tab.
Starts Feb 20
Ends Jun 30

About this course

Skip About this course

This course will give you the necessary background for developing cybersecurity skills and understanding threat intelligence in cybersecurity.

Throughout the course, you will gain a comprehensive understanding of network defensive tactics and explore practical examples of how to protect networks from potential threats. You will delve into the concepts and tools of data loss prevention and endpoint protection, to equip yourself with strategies to safeguard critical data. Additionally, you will have the opportunity to explore a data loss prevention tool and learn how to effectively classify data within your database environment and enhance data security measures.

This course also covers essential security vulnerability scanning technologies and tools, enabling you to identify potential weaknesses in systems and applications. You will recognize various application security threats and common vulnerabilities.

Enroll in this course today in order to establish the necessary foundation for developing cybersecurity expertise as part of the IBM Cybersecurity Analyst Professional Certificate program.

At a glance

  • Institution: IBM
  • Subject: Computer Science
  • Level: Introductory
  • Prerequisites:

    No previous experience required!

  • Language: English
  • Video Transcripts: اَلْعَرَبِيَّةُ, Deutsch, English, Español, Français, हिन्दी, Bahasa Indonesia, Português, Kiswahili, తెలుగు, Türkçe, 中文
  • Associated programs:

What you'll learn

Skip What you'll learn
  • Explain key concepts in threat intelligence
  • Recognize different security threats in applications as well as common vulnerabilities
  • Describe network defensive tactics, data loss prevention, and endpoint protection concepts and tools
  • Differentiate between various scanning technologies and how they apply to cybersecurity

Module 1: Threat Intelligence

Module 2: Data Loss Prevention and Mobile Endpoint Protection

Module 3: Scanning

Module 4: Application Security and Testing

Module 5: SIEM Platforms

Module 6: Threat Hunting

Who can take this course?

Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

This course is part ofCybersecurity Analyst Professional Certificate Program

Learn more 
Expert instruction
8 skill-building courses
Self-paced
Progress at your own speed
9 months
3 - 5 hours per week

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.