Welcome to the IBM Security Learning Academy

The course catalog, shown below, is organized by product segment. Click a product segment to start browsing the available courses and subjects.

Thank you for visiting the site. Please check back often as the site is continually updated with new content.


Choose a category to view courses, roadmaps, and subjects

COVID-19 & Your Business

The IBM Security team is continually monitoring the COVID-19 situation and our teams have adapted and adjusted to support our clients through these trying times. We have assisted numerous organizations as they had to quickly shift to remote working and learning situations. This section on the IBM Security Learning Academy has been created to provide you with tips and tools to help you as your security infrastructure has had to shift and adapt to remote workers and increased loads. These courses and videos are intended to help you with your troubleshooting, tuning and threat management during these times. Please explore the entire Security Learning Academy to find other topics that may help you as well. Check back often as we are collecting and creating content as quickly as possible.
Brad Olive
-Program Director, Learning Services, IBM Security

Latest Courses

Explore the latest additions to the Security Learning Academy.

Access Manager

Security Access Manager is an authentication and authorization solution for corporate web, client/server, and existing applications. Use Security Access Manager to control user access to protected information and resources. By providing a centralized, flexible, and scalable access control solution, Security Access Manager builds secure and easy-to-manage network-based applications and infrastructure.


  • Access Manager

Cloud Identity

IBM® Cloud Identity is a non-disruptive IDaaS solution that bridges from on-premises Identity and Access Management to the cloud. It speeds business agility to adopt cloud applications, increases user productivity with single sign-on from any device, and enables greater IT efficiency by extending existing infrastructure.

Cloud Pak for Security

IBM Cloud Pak for Security is a cloud-based platform that can easily connect to multiple data sources, process the data, and use it to solve different cybersecurity problems such as federated search across various security tools. IBM Cloud Pak for Security boosts your invitations, helps you to process your investigations and workflows faster, and closes the gap with new apps when there is a shortage of cybersecurity resources.

Cyber Security Fundamentals

This category contains courses and presentations collected from cyber security experts and events around the world. These courses are designed to give a broad understanding of current cyber security principles, topics and threats. These fundamentals courses were selected to discuss over-arching cyber security principles and to demonstrate the context in which IBM products are used to solve complex security problems.

For technical training in the use of IBM Security products, you will find hundreds of free courses and hands on labs listed in the product-specific categories of the IBM Security Learning Academy.

Data Encryption

IBM Guardium Data Encryption (GDE) helps protect file and database data from misuse and help you comply with industry and regulatory requirements.

Directory Suite


  • Directory Suite
IBM Security Directory Suite provides a trusted identity data infrastructure for authentication.


IBM Security Guardium safeguards sensitive data with a simple, robust solution that supports the data security lifecycle. From automating compliance to preventing data leaks from databases, files, big data platforms, and more, Guardium can protect your sensitive data.

IBM License Metric Tool

IBM License Metric Tool (ILMT) helps maintain an up-to-date inventory of the software assets that are installed in your infrastructure, gather information about hardware, and ensure license compliance of your enterprise. ILMT shows what software you have, where it is, and how it is used. It also helps you understand your license consumption.



  • IBM i2 Enterprise Insight Analysis
  • IBM i2 Analyst's Notebook
  • IBM i2 iBase

IBM i2 Enterprise Insight Analysis helps your organization turn overwhelming and disparate data into actionable insight and intelligence, in near real time. From national security and defense, to cyber and enterprise-wide threats, the solution helps you develop a comprehensive understanding of your threat landscape to identify vulnerabilities and disrupt threats. The combination of machine-led analytics and human-led analysis capabilities helps you quickly find hidden connections and critical patterns buried in internal, external and open-source data.  

IBM i2 Analyst's Notebook is a visual analysis tool that helps you turn data into intelligence. The solution provides innovative features such as connected network visualizations, social network analysis, and geospatial or temporal views to help you uncover hidden connections and patterns in data. This insight can help you better identify and disrupt criminal, cyber and fraudulent threats.

IBM i2 iBase is an intuitive intelligence data management application that enables collaborative teams of analysts to capture, control and analyze multi-source data in security-rich workgroup environments. It addresses the analyst’s daily challenge of discovering and uncovering networks, patterns and trends in today’s increasing volumes of complex structured and unstructured data. i2 iBase provides a multi-user data sharing environment that combines rich analysis and visualization capabilities with dissemination tools.

Identity Manager

IBM Security Identity Manager is an automated and policy-based solution that manages user access across IT environments, helping to drive effective identity management and governance across the enterprise. By using roles, accounts, and access permissions, it helps automate the creation, modification, and termination of user privileges throughout the entire user lifecycle. IBM Security Identity Manager can help increase user efficiency, reduce IT administration costs, enforce security, and manage compliance.


  • Identity Manager

Identity Governance

IBM Security Identity Governance and Intelligence is a network appliance-based integrated identity governance solution. This solution employs business-centric rules, activities, and processes. It empowers line-of-business managers, auditors, and risk managers to govern access and evaluate regulatory compliance across enterprise applications and services.


  • Identity Governance

Infrastructure Security


  • IBM QRadar Network Security (XGS)
  • IBM Security SiteProtector
  • IBM QRadar Network Security Manager

Learn what a next-generation IPS is, how to deploy it in your network, and how to install, set up, and configure to guard your network infrastructure with Ahead of the Threat® protection.

Mainframe: zSecure


  • zSecure

IBM mainframe security solutions can help you protect your enterprise, detect threats, comply with policy and regulations and reduce costs.

Managed Security Services

When you partner with IBM for all your managed security needs, you are accessing the full depth and breadth of IBM's expertise.

Mobile Security: IBM MaaS360

IBM MaaS360 with Watson is a leading unified endpoint management (UEM) platform used to manage and safeguard enterprise mobile devices, apps, and content. Thousands of organizations of all sizes across all industries trust MaaS360 with Watson as the foundation for their digital transformation with mobile. With Watson, MaaS360 delivers cognitive UEM with strong security controls across users, devices, apps, and content to support endpoint and mobile deployments.

Delivered from a best-in-class IBM Cloud on a mature, trusted platform, MaaS360 helps manage a wide variety of devices for multiple users from a single console, and provides integration with solutions from Apple, Google, Microsoft, and other management tool suppliers. IBM works hand-in-hand with these suppliers not only to provide integration but to ensure that integration can occur as soon as new tools or updates to existing tools are available.

To follow a guided learning path based on your role, click Training roadmaps in the IBM MaaS360 Training Roadmaps tile. There are training roadmaps for Administrators, Deployment Professionals, Help Desk, and Integration Professional.

Privileged Identity Manager


  • Privileged Identity Manager

Privilege Manager

IBM Security Privilege Manager provides endpoint privilege management and application control.

QRadar Security Intelligence


  • QRadar SIEM
  • QRadar Vulnerability Manager
  • QRadar Network Insights
  • QRadar Advisor with Watson
  • User Behavior Analytics (UBA)
  • QRadar DNS Analyzer
The IBM QRadar Security Intelligence Platform provides a unified architecture for integrating core functionality to prevent, detect and respond to attacks, including security analytics, threat hunting, incident response, and threat intelligence with network and endpoint protection, into one centralized Security Operations Center user interface.

Explore IBM Resilient SOAR platform

IBM Resilient Security, Orchestration, Automation, and Response platform (SOAR) is the leading platform for orchestrating and automating incident response processes.

Security Key Lifecycle Manager

IBM Security Key Lifecycle Manager centralizes, simplifies, and automates the encryption key management process and helps minimize risk and reduce the cost of managing encryption keys.

Secret Server

IBM Security Secret Server helps you keep privileged accounts safe with a secure encrypted vault to store and rotate your sensitive accounts. Discovering and vaulting privileged accounts helps you understand how many privileged accounts you have, and exactly who has access to your key systems through real-time session monitoring, recording and key logging. IBM Secret Server will also help you maintain compliance through full audit reports on vault activity.


  • IBM Security Secret Server

Securing the Cloud

This category has general cloud computing and cloud security concepts with a focus on securing the Cloud. IBM Security products, solutions, and services are covered at both a high level conceptual and detailed implementation level with regard to securing the cloud.

Systems Integration

Point solutions do not solve security problems and fail to provide context and insights. IBM offers integrated security solutions that simplify management, include a broad span of coverage, and create intelligence from the security data gathered from your organization.

IBM Trusteer

Outthink fraudsters with IBM Trusteer

IBM Trusteer products deliver a holistic fraud prevention platform. Here, you will find our solutions for online, mobile and cross-channel fraud.

X-Force Threat Intelligence


  • X-Force Exchange

IBM X-Force Exchange is a collaborative threat intelligence platform that helps security analysts add external context to internal indicators and speed security investigations

IBM Security Credentials

IBM credentials are valued and recognized by the global IT industry. Communicating your credentials can be a challenge in today’s online marketplace so IBM supports a full range of Digital Badges and Professional Certifications to attest to your skills. Each certification calls for the successful completion of one or more certification tests. Each certification course is free-of-charge and focuses on the knowledge and technical skills measured on a test.

IBM Digital Badges

IBM Digital Badges attest to your mastery of a specified role. Some badges can be earned by completing a course of self-study and passing a an online quiz. Other badges require your participation in an instructor-led course, either delivered by an authorized IBM Training Partner or at an IBM training event.

IBM Security Certifications

The IBM Security Certifications are part of the IBM Professional Certification Program (ibm.com/certify), a worldwide industry program open to all technical professionals (IBM employees, Business Partners, Clients). This program enables you to demonstrate your proficiency in the latest IBM technology and solutions. It helps establish that you have the capability to perform job role related tasks and activities at a specified level of competence. Your participation is beneficial if you wish to validate your knowledge and technical skills, as well as for companies that wish to ensure certain performance levels for their employees.