Об этом курсе
Недавно просмотрено: 3,051

100% онлайн

Начните сейчас и учитесь по собственному графику.

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.

Прибл. 16 часа на выполнение

Предполагаемая нагрузка: 13 hours/week...

Английский

Субтитры: Английский

100% онлайн

Начните сейчас и учитесь по собственному графику.

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.

Прибл. 16 часа на выполнение

Предполагаемая нагрузка: 13 hours/week...

Английский

Субтитры: Английский

Программа курса: что вы изучите

Неделя
1
2 ч. на завершение

People Process & Technology

This module will take you through a typical Security organization. You will also learn about the service management framework and how it affects how an organization will use this framework to avoid or react to cybersecurity attacks. You will also research ITIL standard processes.

...
9 видео ((всего 48 мин.)), 4 материалов для самостоятельного изучения, 4 тестов
9 видео
Overview of People, Process and Technologies1мин
What is IT Security?42
Frameworks and their purpose4мин
Roles in Security4мин
Introduction to Process4мин
Business Process Management Overview14мин
Information Technology Infrastructure Library (ITIL) Overview9мин
Key ITIL Processes6мин
4 материала для самостоятельного изучения
Earn an IBM digital badge5мин
Your Subject Matter Experts10мин
ITIL framework30мин
What is IT Service Management?15мин
4 практического упражнения
Welcome to People, Process and Operating System Fundamentals for Cybersecurity4мин
Frameworks, Policies and Roles4мин
Business Process Management and IT Infrastructure Library Basics8мин
People, Process and Technology20мин
Неделя
2
2 ч. на завершение

Examples & Principles of the CIA Triad

This module will explain what is the CIA Triad and how is it important to cybersecurity concepts and practice.

...
5 видео ((всего 16 мин.)), 1 материал для самостоятельного изучения, 2 тестов
5 видео
Who are Alice, Bob and Trudy?3мин
Confidentiality, Integrity and Availability9мин
Authenticity and Accountability1мин
Priscilla Mariel Guzman Angulo - What's important for my job.1мин
1 материал для самостоятельного изучения
Threat Horizon 2019: Disruption. Distortion. Deterioration
2 практического упражнения
Further discussion of confidentiality, integrity and availability6мин
Principles of the CIA Triad10мин
1 ч. на завершение

Authentication and Access Control

In this module you will learn the importance of authentication and identification. You will also learn how access controls both physical and logical help safeguard an organization. You will also investigate an identified risk around access control.

...
5 видео ((всего 23 мин.)), 1 материал для самостоятельного изучения, 3 тестов
5 видео
Identification and AAA7мин
Access Control Methods3мин
Access Control - Physical and Logical6мин
Open Web Application Security Project (OWASP)3мин
1 материал для самостоятельного изучения
OWASP Top 10 Project20мин
3 практического упражнения
What is AAA?4мин
Access Control4мин
Authentication and Access control15мин
Неделя
3
1 ч. на завершение

Windows Operating System Security Basics

In this module you will learn about the file system and directory structures for the Windows operating system. You will also learn about many shortcuts and commands which will help you to navigate the Windows system to gather information and reduce your work time.

...
6 видео ((всего 28 мин.)), 4 тестов
6 видео
User and Kernel Mode4мин
File Systems3мин
Directory Structure6мин
Shortcuts and Commands5мин
Additional Shortcuts6мин
4 практического упражнения
User and Kernel Modes2мин
File Systems and Directory Structure4мин
Shortcuts and Commands4мин
Windows Operating System Security Basics20мин
1 ч. на завершение

Linux Operating System Security Basics

In this module you will learn the key components of the Linux operating system and basic commands required to assist you in accessing information that pertains to the security of your systems. You will also access Pentestmonkey a resource many cybersecurity professionals use to access cheat sheets about certain cybersecurity vulnerabilities and investigations.

...
4 видео ((всего 21 мин.)), 1 материал для самостоятельного изучения, 4 тестов
4 видео
File Systems6мин
Basic Commands5мин
Permissions and Owners6мин
1 материал для самостоятельного изучения
Pentestmonkey research20мин
4 практического упражнения
Key Components2мин
File systems2мин
Linux Basic Commands4мин
Linux Operating System security basics20мин
1 ч. на завершение

macOS Security Basics

In this module you will learn how to find resources around MAC/OS. You will read documentation from Apple around the security framework and how to investigate additional information through the eyes of a developer.

...
1 видео ((всего 1 мин.)), 1 материал для самостоятельного изучения
1 видео
1 материал для самостоятельного изучения
macOS Developer resources45мин
Неделя
4
1 ч. на завершение

Overview of Virtualization

In this module, you will learn the basics of virtualization and cloud computing. You will also learn about cloud computing governance, security and benefits.

...
6 видео ((всего 30 мин.)), 2 материалов для самостоятельного изучения, 2 тестов
6 видео
An Overview of Virtualization3мин
Virtualization to Cloud4мин
What is Cloud Computing?12мин
Cloud Benefits, Security and Governance7мин
Wrap up20
2 материала для самостоятельного изучения
SANS Institute research exercise3мин
Differences between virtualization and cloud - RedHat20мин
2 практического упражнения
Virtualization Basics and Cloud Computing12мин
Virtualization Basics15мин

Преподаватели

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

О IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

О специализации ''IT Fundamentals for Cybersecurity'

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Часто задаваемые вопросы

  • Зарегистрировавшись на сертификацию, вы получите доступ ко всем видео, тестам и заданиям по программированию (если они предусмотрены). Задания по взаимной оценке сокурсниками можно сдавать и проверять только после начала сессии. Если вы проходите курс без оплаты, некоторые задания могут быть недоступны.

  • Записавшись на курс, вы получите доступ ко всем курсам в специализации, а также возможность получить сертификат о его прохождении. После успешного прохождения курса на странице ваших достижений появится электронный сертификат. Оттуда его можно распечатать или прикрепить к профилю LinkedIn. Просто ознакомиться с содержанием курса можно бесплатно.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

Остались вопросы? Посетите Центр поддержки учащихся.