Cybersecurity Workforce Program Content
Sidebar
The Cybersecurity Workforce Program offers flexible learning paths designed for a range of learners, from beginners to experienced professionals. Participants can choose from various course bundles based on their goals and availability. To gain access to the complete curriculum, learners can enroll in the full 6-month program.
In addition to the full program, we offer three structured program levels—Explorer, Practitioner, and Professional—each lasting approximately 60 days and consisting of 6–8 modules. For those seeking a shorter commitment or more focused content, we also offer Specialized Bundles, which include as few as 3 modules and can be completed in as little as 90 days.
Upon completion of the full program or any of the bundles, students earn a digital badge that recognizes their achievement and can be shared on LinkedIn, resumes, or digital portfolios.
Note for all PROGRAMS: Each bundle includes assignments and examples tailored to either a healthcare or logistics concentration. The core content remains the same regardless of the concentration you choose.
Program options and course descriptions
Full program
This module provides an overview of the basics of information technology. You will learn about the inner and outer workings of computers, troubleshooting, and how it can help to become a professional in the IT field.
This module examines the framework of legal and ethical concerns (a sense of right and wrong conduct) within the operations of computing systems, particularly regarding misconduct involving those systems. You will examine the legal framework to help you understand the reprecusions of breaking laws and to know when to involve law enforcement.
This module provides an overview of the cybersecurity field and its related concepts. An introduction to cybersecurity terminology, best practices, principles and standards, planning and management of cybersecurity functions, and assets are included. This module will provide a foundation for understanding common threats and attacks and the methods and tools to defend and protect against them, an overview of human, organizational, social, and legal issues related to cybersecurity, and concepts which meet national standards in cybersecurity.
This module introduces problem-solving techniques and the computer program development process through coding in a high-level language. Topics include program structure, data types, variables, operations, expressions, input/output, sequence, selection and repetition, functions, data structures, and software design techniques. Concepts are reinforced with many programming laboratory exercises throughout the course.
This module discusses the foundations of computer networks. You will learn about the network architecture, including the OSI model and the layering concept, and TCP/IP protocol stack layers. You will learn about physical layer concepts, including communication media, multiplexing, and switching; data link layer concepts and protocols; network layer concepts and protocols, transport layer concepts and protocols, and application layer concepts such as client-servers. The course also provides an overview of wireless networking technologies (WiFi).
This module provides an overview of fundamental concepts of databases and database management. These concepts include aspects of database design, database management systems, data models, normalization, the standard relational database query, SQL, basic database security and relational database alternatives.
This module provides an overview of artificial intelligence's fundamental techniques and approaches. Topics include the history of AI, knowledge and reasoning, problem-solving, learning approaches, practical considerations, and responsible AI. The module uses case studies from cybersecurity and healthcare applications.
This module provides an overview of cryptography, various types of data and the fingerprints they leave, and classical and modern cryptosystems.
This module provides knowledge of basic cryptography and cryptographic key management concepts and skills in identifying the privacy and security risks inherent in blockchain, including hacking concerns. You gain the ability to apply platforms such as IBM Hyperledger to build applications on blockchain technology.
This module provides an overview of the basics of information security. You will gain the ability to apply cybersecurity and privacy principles in the work setting and conduct vulnerability scans.
This module provides an overview of network security, network defense, and security threats. You will gain skills in using network security tools and skills in performing attacks.
This module provides an overview of cloud computing and how it can be used. You will gain the ability to provide the appropriate cloud computing solutions and recommendations according to the applications used. Your knowledge of cloud foundations will include concepts related to security, governance, procurement, and administration.
This module provides an overview of what cyber threats are by taking on the role of a threat actor. You will develop skills in identifying cyber threats and analyzing the target or threat for strength and morale.
This module covers the fundamentals of digital forensics. Topics will include historical cases, key concepts, and tools and techniques of the trade. In addition, reporting methods will be discussed. Various open-source tools will be used in the lab portion of the module.
This module provides an overview of the basic concepts of data mining. You will gain skills in recognizing data mining problems, writing code, and an understanding of the importance of legal/ethical aspects of data mining.
This module provides an overview of AI, cloud computing technologies, and machine learning techniques. In addition, you will develop skills in text mining/manipulation techniques and implementing methods/algorithms for image and video processing.
This module provides an overview of current and emerging data remediation security features in databases. You will also learn about databases' current and emergent data encryption security features. You will finish this course with the ability to create a plan for vulnerability detection and identification in databases and apply new methods of database protection and use tools for database security assessment.
This module provides an overview of classic security techniques to today’s cloud security problems. The course will start with a deceptively simple and secure web service and address the problems arising as you improve it. You will learn to analyze recent cloud security vulnerabilities using standard, systematic techniques. You will build their own web service case studies and construct security solutions
This module provides an overview of risk assessment methodologies and of Cybersecurity practices in the Risk Management Framework. You will be able to select and apply optimal risk methodologies and framework based on needs, advantages and disadvantages to provide structure to the decision-making needed to invest in resources to mitigate cybersecurity risks.
This module provides an overview of network protocols, data and information security, and data analytics. You will learn about network protocol and security issues pertaining to IoT networks and data analytics problems to address security issues pertaining to IoT networks.
This module provides an overview of data structures, web services, and enterprise-wide business process improvement initiatives. You will be able to apply the technologies and best practices used to enable process automation and connect technology with measurable business value.
This module covers the foundational principles and techniques of quantum technology, including basic quantum mechanics; quantum information theory and quantum algorithms such as Grover's search and Shor's factoring; quantum error-correcting codes; and quantum computing applications such as quantum encryption and quantum key distribution. You will explore and discuss real-world scenarios related to the understanding of quantum technologies; you will understand the opportunities and challenges presented by quantum technology by learning about quantum computers and algorithms using IBM Q Experience quantum devices.
The purpose of this capstone project is for the participants to apply knowledge and skills acquired during the Cybersecurity Healthcare certificate program to a project involving actual data in a realistic setting. During the project, participants will engage in the entire process of analyzing a real-world cybersecurity project or case study and apply suitable methods to address the problem. Both the problem statements for the capstone project assignments and any relevant datasets will represent real-world domains similar to those that participants might typically encounter within healthcare-related industry, government, or non-governmental organizations (NGOs).
Level Bundles
This module provides an overview of the basics of information technology. You will learn about the inner and outer workings of computers, troubleshooting, and how it can help to become a professional in the IT field.
This module examines the framework of legal and ethical concerns (a sense of right and wrong conduct) within the operations of computing systems, particularly regarding misconduct involving those systems. You will examine the legal framework to help you understand the reprecusions of breaking laws and to know when to involve law enforcement.
This module provides an overview of the cybersecurity field and its related concepts. An introduction to cybersecurity terminology, best practices, principles and standards, planning and management of cybersecurity functions, and assets are included. This module will provide a foundation for understanding common threats and attacks and the methods and tools to defend and protect against them, an overview of human, organizational, social, and legal issues related to cybersecurity, and concepts which meet national standards in cybersecurity.
This module introduces problem-solving techniques and the computer program development process through coding in a high-level language. Topics include program structure, data types, variables, operations, expressions, input/output, sequence, selection and repetition, functions, data structures, and software design techniques. Concepts are reinforced with many programming laboratory exercises throughout the course.
This module discusses the foundations of computer networks. You will learn about the network architecture, including the OSI model and the layering concept, and TCP/IP protocol stack layers. You will learn about physical layer concepts, including communication media, multiplexing, and switching; data link layer concepts and protocols; network layer concepts and protocols, transport layer concepts and protocols, and application layer concepts such as client-servers. The course also provides an overview of wireless networking technologies (WiFi).
This module provides an overview of fundamental concepts of databases and database management. These concepts include aspects of database design, database management systems, data models, normalization, the standard relational database query, SQL, basic database security and relational database alternatives.
This module provides an overview of artificial intelligence's fundamental techniques and approaches. Topics include the history of AI, knowledge and reasoning, problem-solving, learning approaches, practical considerations, and responsible AI. The module uses case studies from cybersecurity and healthcare applications.
This module provides an overview of cryptography, various types of data and the fingerprints they leave, and classical and modern cryptosystems.
This module provides knowledge of basic cryptography and cryptographic key management concepts and skills in identifying the privacy and security risks inherent in blockchain, including hacking concerns. You gain the ability to apply platforms such as IBM Hyperledger to build applications on blockchain technology.
This module provides an overview of the basics of information security. You will gain the ability to apply cybersecurity and privacy principles in the work setting and conduct vulnerability scans.
This module provides an overview of network security, network defense, and security threats. You will gain skills in using network security tools and skills in performing attacks.
This module provides an overview of cloud computing and how it can be used. You will gain the ability to provide the appropriate cloud computing solutions and recommendations according to the applications used. Your knowledge of cloud foundations will include concepts related to security, governance, procurement, and administration.
This module provides an overview of what cyber threats are by taking on the role of a threat actor. You will develop skills in identifying cyber threats and analyzing the target or threat for strength and morale.
This module covers the fundamentals of digital forensics. Topics will include historical cases, key concepts, and tools and techniques of the trade. In addition, reporting methods will be discussed. Various open-source tools will be used in the lab portion of the module.
This module provides an overview of the basic concepts of data mining. You will gain skills in recognizing data mining problems, writing code, and an understanding of the importance of legal/ethical aspects of data mining.
This module provides an overview of AI, cloud computing technologies, and machine learning techniques. In addition, you will develop skills in text mining/manipulation techniques and implementing methods/algorithms for image and video processing.
This module provides an overview of current and emerging data remediation security features in databases. You will also learn about databases' current and emergent data encryption security features. You will finish this course with the ability to create a plan for vulnerability detection and identification in databases and apply new methods of database protection and use tools for database security assessment.
This module provides an overview of classic security techniques to today’s cloud security problems. The course will start with a deceptively simple and secure web service and address the problems arising as you improve it. You will learn to analyze recent cloud security vulnerabilities using standard, systematic techniques. You will build their own web service case studies and construct security solutions
This module provides an overview of risk assessment methodologies and of Cybersecurity practices in the Risk Management Framework. You will be able to select and apply optimal risk methodologies and framework based on needs, advantages and disadvantages to provide structure to the decision-making needed to invest in resources to mitigate cybersecurity risks.
This module provides an overview of network protocols, data and information security, and data analytics. You will learn about network protocol and security issues pertaining to IoT networks and data analytics problems to address security issues pertaining to IoT networks.
This module provides an overview of data structures, web services, and enterprise-wide business process improvement initiatives. You will be able to apply the technologies and best practices used to enable process automation and connect technology with measurable business value.
This module covers the foundational principles and techniques of quantum technology, including basic quantum mechanics; quantum information theory and quantum algorithms such as Grover's search and Shor's factoring; quantum error-correcting codes; and quantum computing applications such as quantum encryption and quantum key distribution. You will explore and discuss real-world scenarios related to the understanding of quantum technologies; you will understand the opportunities and challenges presented by quantum technology by learning about quantum computers and algorithms using IBM Q Experience quantum devices.
Specialized bundles
This module provides an overview of artificial intelligence's fundamental techniques and approaches. Topics include the history of AI, knowledge and reasoning, problem-solving, learning approaches, practical considerations, and responsible AI. The module uses case studies from cybersecurity and healthcare applications.
This module provides an overview of AI, cloud computing technologies, and machine learning techniques. In addition, you will develop skills in text mining/manipulation techniques and implementing methods/algorithms for image and video processing.
This module provides an overview of data structures, web services, and enterprise-wide business process improvement initiatives. You will be able to apply the technologies and best practices used to enable process automation and connect technology with measurable business value.
This module introduces problem-solving techniques and the computer program development process through coding in a high-level language. Topics include program structure, data types, variables, operations, expressions, input/output, sequence, selection and repetition, functions, data structures, and software design techniques. Concepts are reinforced with many programming laboratory exercises throughout the course.
This module provides an overview of artificial intelligence's fundamental techniques and approaches. Topics include the history of AI, knowledge and reasoning, problem-solving, learning approaches, practical considerations, and responsible AI. The module uses case studies from cybersecurity and healthcare applications.
This module provides an overview of AI, cloud computing technologies, and machine learning techniques. In addition, you will develop skills in text mining/manipulation techniques and implementing methods/algorithms for image and video processing.
This module provides an overview of data structures, web services, and enterprise-wide business process improvement initiatives. You will be able to apply the technologies and best practices used to enable process automation and connect technology with measurable business value.
This module provides an overview of the basic concepts of data mining. You will gain skills in recognizing data mining problems, writing code, and an understanding of the importance of legal/ethical aspects of data mining.
This module provides knowledge of basic cryptography and cryptographic key management concepts and skills in identifying the privacy and security risks inherent in blockchain, including hacking concerns. You gain the ability to apply platforms such as IBM Hyperledger to build applications on blockchain technology.
This module discusses the foundations of computer networks. You will learn about the network architecture, including the OSI model and the layering concept, and TCP/IP protocol stack layers. You will learn about physical layer concepts, including communication media, multiplexing, and switching; data link layer concepts and protocols; network layer concepts and protocols, transport layer concepts and protocols, and application layer concepts such as client-servers. The course also provides an overview of wireless networking technologies (WiFi).
This module provides an overview of the basics of information security. You will gain the ability to apply cybersecurity and privacy principles in the work setting and conduct vulnerability scans.
This module provides an overview of network security, network defense, and security threats. You will gain skills in using network security tools and skills in performing attacks.
This module provides an overview of cloud computing and how it can be used. You will gain the ability to provide the appropriate cloud computing solutions and recommendations according to the applications used. Your knowledge of cloud foundations will include concepts related to security, governance, procurement, and administration.
This module provides an overview of classic security techniques to today’s cloud security problems. The course will start with a deceptively simple and secure web service and address the problems arising as you improve it. You will learn to analyze recent cloud security vulnerabilities using standard, systematic techniques. You will build their own web service case studies and construct security solutions
This module provides an overview of cryptography, various types of data and the fingerprints they leave, and classical and modern cryptosystems.
This module covers the foundational principles and techniques of quantum technology, including basic quantum mechanics; quantum information theory and quantum algorithms such as Grover's search and Shor's factoring; quantum error-correcting codes; and quantum computing applications such as quantum encryption and quantum key distribution. You will explore and discuss real-world scenarios related to the understanding of quantum technologies; you will understand the opportunities and challenges presented by quantum technology by learning about quantum computers and algorithms using IBM Q Experience quantum devices.
This module covers the fundamentals of digital forensics. Topics will include historical cases, key concepts, and tools and techniques of the trade. In addition, reporting methods will be discussed. Various open-source tools will be used in the lab portion of the module.
This module provides an overview of fundamental concepts of databases and database management. These concepts include aspects of database design, database management systems, data models, normalization, the standard relational database query, SQL, basic database security and relational database alternatives.
This module provides an overview of current and emerging data remediation security features in databases. You will also learn about databases' current and emergent data encryption security features. You will finish this course with the ability to create a plan for vulnerability detection and identification in databases and apply new methods of database protection and use tools for database security assessment.
This module provides an overview of what cyber threats are by taking on the role of a threat actor. You will develop skills in identifying cyber threats and analyzing the target or threat for strength and morale.
This module provides an overview of the basics of information technology. You will learn about the inner and outer workings of computers, troubleshooting, and how it can help to become a professional in the IT field.
This module examines the framework of legal and ethical concerns (a sense of right and wrong conduct) within the operations of computing systems, particularly regarding misconduct involving those systems. You will examine the legal framework to help you understand the repercussions of breaking laws and to know when to involve law enforcement.
This module provides an overview of the cybersecurity field and its related concepts. An introduction to cybersecurity terminology, best practices, principles and standards, planning and management of cybersecurity functions, and assets are included. This module will provide a foundation for understanding common threats and attacks and the methods and tools to defend and protect against them, an overview of human, organizational, social, and legal issues related to cybersecurity, and concepts which meet national standards in cybersecurity.
This module provides an overview of network protocols, data and information security, and data analytics. You will learn about network protocol and security issues pertaining to IoT networks and data analytics problems to address security issues pertaining to IoT networks.
This module discusses the foundations of computer networks. You will learn about the network architecture, including the OSI model and the layering concept, and TCP/IP protocol stack layers. You will learn about physical layer concepts, including communication media, multiplexing, and switching; data link layer concepts and protocols; network layer concepts and protocols, transport layer concepts and protocols, and application layer concepts such as client-servers. The course also provides an overview of wireless networking technologies (WiFi).
This module provides an overview of the basics of information security. You will gain the ability to apply cybersecurity and privacy principles in the work setting and conduct vulnerability scans.
This module provides an overview of cloud computing and how it can be used. You will gain the ability to provide the appropriate cloud computing solutions and recommendations according to the applications used. Your knowledge of cloud foundations will include concepts related to security, governance, procurement, and administration.
This module provides an overview of classic security techniques to today’s cloud security problems. The course will start with a deceptively simple and secure web service and address the problems arising as you improve it. You will learn to analyze recent cloud security vulnerabilities using standard, systematic techniques. You will build their own web service case studies and construct security solutions
This module discusses the foundations of computer networks. You will learn about the network architecture, including the OSI model and the layering concept, and TCP/IP protocol stack layers. You will learn about physical layer concepts, including communication media, multiplexing, and switching; data link layer concepts and protocols; network layer concepts and protocols, transport layer concepts and protocols, and application layer concepts such as client-servers. The course also provides an overview of wireless networking technologies (WiFi).
This module provides an overview of the basics of information security. You will gain the ability to apply cybersecurity and privacy principles in the work setting and conduct vulnerability scans.
This module provides an overview of network security, network defense, and security threats. You will gain skills in using network security tools and skills in performing attacks.
This module provides an overview of the cybersecurity field and its related concepts. An introduction to cybersecurity terminology, best practices, principles and standards, planning and management of cybersecurity functions, and assets are included. This module will provide a foundation for understanding common threats and attacks and the methods and tools to defend and protect against them, an overview of human, organizational, social, and legal issues related to cybersecurity, and concepts which meet national standards in cybersecurity.
This module provides an overview of cryptography, various types of data and the fingerprints they leave, and classical and modern cryptosystems.
This module covers the fundamentals of digital forensics. Topics will include historical cases, key concepts, and tools and techniques of the trade. In addition, reporting methods will be discussed. Various open-source tools will be used in the lab portion of the module.
This module provides an overview of risk assessment methodologies and of Cybersecurity practices in the Risk Management Framework. You will be able to select and apply optimal risk methodologies and framework based on needs, advantages and disadvantages to provide structure to the decision-making needed to invest in resources to mitigate cybersecurity risks.
This module provides an overview of what cyber threats are by taking on the role of a threat actor. You will develop skills in identifying cyber threats and analyzing the target or threat for strength and morale.