Chevron Left
Вернуться к Cyber Threat Intelligence

Отзывы учащихся о курсе Cyber Threat Intelligence от партнера IBM

4.7
звезд
Оценки: 595
Рецензии: 126

О курсе

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. This course also gives you hands on access to cybersecurity tools important to a system analyst. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the sixth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cyber Threat Intelligence IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cyber-threat-intelligence. In this course, you will learn to: • Describe examples of network defensive tactics. • Discuss data loss prevention and endpoint protection concepts and tools. • Explore a data loss prevention tool and learn how to classify data in your database environment. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. • Identify the key concepts around threat intelligence. • Explore a SIEM product and review suspicious alerts and how to take action....

Лучшие рецензии

DK
10 июля 2020 г.

SIEM Concepts and Benefits - First\n\nvideo is missing, i can hear only the audio in most part of the video.\n\nKindly, check at your end to avoid problem to the other viewers.\n\nThank you

OA
10 июля 2020 г.

This course ought to have come first to provide a context for each concepts presented in previous courses. It really provided more clarity on the whole field of Cyber Security.

Фильтр по:

1–25 из 129 отзывов о курсе Cyber Threat Intelligence

автор: Tony F

26 авг. 2020 г.

learnt more about cyber threats and soc intelligence. application lecturer sound like she is drunk there is no enthusiasm reading like a robot.

автор: LALIT K T

14 июня 2020 г.

Very solid course. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge.

автор: ravindu k

27 июня 2020 г.

I think this is my favorite course un this series thank you Ibm and Coursera

автор: Nazmul A J

16 июня 2020 г.

Alhamdulllah

автор: BHABESH K D

19 июня 2020 г.

as the usual module was good and very interesting videos with proper knowledge

автор: MD. A A M

13 июня 2020 г.

nice

автор: Zbynek B

20 сент. 2020 г.

Very high level. Almost no examples.

Half of the lessons have very poor audio compromised by room acoustics, annoying reverberation, wrong microphone placement, and transmission drop-outs. This deteriorates the intelligibility considerably. Sometimes rendering the presentation useless.

The other half of the lessons is a presentation with professional voice over. However, the voice actor has no idea what she is reading.

Find yourself another course. This one is really bad.

I have certificates from nine courses so far and while some were excellent (five stars), this one is by far the worst one!

автор: fabrice k

1 сент. 2020 г.

Excellent and well structured. This course is a really ready job placement. I learned a lot through the video and Labs completed through the IBM security academy. Now I can apply the knowledge gain as a Threat Hunter. Thanks IBM

автор: Oluwafemi M A

10 июля 2020 г.

This course ought to have come first to provide a context for each concepts presented in previous courses. It really provided more clarity on the whole field of Cyber Security.

автор: LUIS A S L

16 мая 2021 г.

Finding this IBM specialization was the best thing that ever happened to me. It gets more and more interesting. Thank you IBM and Coursera for making it possible.

автор: Rohan P

28 июня 2020 г.

This course is really awesome. It gives insightful knowledge with IBM tools and attached resources. Worth it.

автор: Joseph P

9 июля 2020 г.

Much longer and more in-depth than previous lessons. Quality of videos is much better as well.

автор: Yasir J

2 июля 2020 г.

This Course was amazing and with bundles of new concepts and technology

автор: ADITYA A

26 июня 2020 г.

Learned a lot. Great Course. Thank you so much.

автор: ALI E

18 июня 2020 г.

thank you very appreciated

автор: Md. T U B

6 июля 2020 г.

excellent

автор: Kaushal A

1 июля 2020 г.

I"m going to give this course 3*'s because of a few issues. Firstly, The specialization has vanished from Coursera's catalog!. Secondly, the final video before the graded assessment has a lot of audio that makes it feel as if the video/course has been tampered with, and thirdly, the course instructors have a robotic voice, and in the discussion forums don't have a prompt response timing!

But the course contents are really good. Going to have to check my laptop if the weird sounds caused any troubles.

автор: HARSHIT A

3 янв. 2021 г.

After the lab is started it doesn't takes commands. I am unable to complete lab and unable to get knowledge about the lab.

This is with all the labs not with particular lab. After opening the browser in the windows framework of Lab i am not able to do anything.

Regards

Harshit Agarwal

автор: Paul B

5 нояб. 2020 г.

The woman who reads most of this is either drunk and/or doesn't understand the content of what she is reading.

автор: Evgeniya K

2 янв. 2021 г.

Very poor presentation of the material.

автор: MOHAMMED V S

5 мар. 2021 г.

Threat Hunting Overview Knowledge Check

TOTAL POINTS 7

1.

Question 1

Cyber threats pose many challenges to organizations today. Which three (3) of these are among those cited? (Select 3)

1 / 1 point

It takes an average of 191 days to even detect an attack has occurred

Correct

Partially correct!

Almost half of the breaches are caused by malicious or criminal acts

Correct

Partially correct!

There are too few cybersecurity tools available from too few vendors

There is a cybersecurity skills shortage

Correct

Partially correct!

2.

Question 2

What percent of security leaders reported that threat hunting increased the speed and accuracy of response in detection of advanced threats?

1 / 1 point

10%

27%

91%

100%

Correct

Correct!

3.

Question 3

While 80% of the threats are known and detected, the 20% that remains unknown account for what percent of the damage?

1 / 1 point

20%

40%

80%

100%

Correct

Correct!

4.

Question 4

True or False. The skill set of a cyber threat hunter is very different from that of a cybersecurity analyst and many threat hunters a have backrounds doing intelligence work.

1 / 1 point

True

False

Correct

Correct!

5.

Question 5

Your enemy uses a cyber kill chain to plan and execute his attack against your organization. Which three (3) of these are steps in a cyber kill chain? (Select 3)

1 / 1 point

Delivery

Correct

Partially correct!

Weaponization

Correct

Partially correct!

Reconnaissance

Correct

Partially correct!

Negotiation

6.

Question 6

True or False. A cyber threat hunting team generally sits at the center of the SOC Command Center.

1 / 1 point

True

False

Correct

Correct!

7.

Question 7

There is value brought by each of the IBM i2 EIA use cases. Which one of these delivers net new discovery of correlating low level alerts and offenses?

0 / 1 point

Insider Threat

Fraud Investigations

Cyber Threat Hunting

VIP Protection

Incorrect

Incorrect. Perhaps you should review the video Cyber Threat Hunting - An Industry Example.

автор: Lakeside D

11 окт. 2021 г.

I'm so glad I discovered this course! IBM has been a leader in cybersecurity for a long time, and I have been looking to break into this field for a while. This course was the perfect introduction to the subject and I feel confident that it's going to help me learn what I need in order to become job-ready for a cybersecurity analyst position.

автор: George L T

13 мар. 2021 г.

This is definitely 5 stars course, it brought new bird a entry level views which details of the knowledge of the variety kinds of the knowledge in Cyber Threat intelligence, it prepared a take away weapons for a System Security Professional.

Thanks so much IBM and Coursera to introduced the quality course content, thanks.

автор: Miguel C

3 сент. 2020 г.

Great course, the labs were the best, it allowed you to get some valuable on hands experience and the various resources provided to help you learn more about Cyber Security were also very valuable. Great course.

автор: George M

27 апр. 2021 г.

This Course picks up the speed and describes support levels, intelligence systems, security architecture principles and concludes with a concise overview of where the cyber threat hunting industry is going.