DK
10 июля 2020 г.
SIEM Concepts and Benefits - First
video is missing, i can hear only the audio in most part of the video.
Kindly, check at your end to avoid problem to the other viewers.
Thank you
RR
24 мая 2022 г.
I studied for a LONG time for this and it paid off. I'm taking this certification for preparation towards the Security+, so far, I think it's doing a good job at preparing me for it.
автор: Nazmul A J
•16 июня 2020 г.
Alhamdulllah
автор: Tony F
•26 авг. 2020 г.
learnt more about cyber threats and soc intelligence. application lecturer sound like she is drunk there is no enthusiasm reading like a robot.
автор: LALIT K T
•14 июня 2020 г.
Very solid course. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge.
автор: ravindu k
•27 июня 2020 г.
I think this is my favorite course un this series thank you Ibm and Coursera
автор: Oluwafemi M A
•10 июля 2020 г.
This course ought to have come first to provide a context for each concepts presented in previous courses. It really provided more clarity on the whole field of Cyber Security.
автор: LUIS A S L
•16 мая 2021 г.
Finding this IBM specialization was the best thing that ever happened to me. It gets more and more interesting. Thank you IBM and Coursera for making it possible.
автор: BHABESH K D
•19 июня 2020 г.
as the usual module was good and very interesting videos with proper knowledge
автор: MD. A A M
•13 июня 2020 г.
nice
автор: Zbynek B
•20 сент. 2020 г.
Very high level. Almost no examples.
Half of the lessons have very poor audio compromised by room acoustics, annoying reverberation, wrong microphone placement, and transmission drop-outs. This deteriorates the intelligibility considerably. Sometimes rendering the presentation useless.
The other half of the lessons is a presentation with professional voice over. However, the voice actor has no idea what she is reading.
Find yourself another course. This one is really bad.
I have certificates from nine courses so far and while some were excellent (five stars), this one is by far the worst one!
автор: Paul B
•5 нояб. 2020 г.
The woman who reads most of this is either drunk and/or doesn't understand the content of what she is reading.
автор: Frank B
•28 окт. 2021 г.
Knowledge of cyber threats and its growing number of exploits and other considerations from the hardware and software points of view have become a key consideration when deploying new company initiatives. Knowing about these challenges is key in order to make these efforts safe and sustainable in time
автор: fabrice k
•1 сент. 2020 г.
Excellent and well structured. This course is a really ready job placement. I learned a lot through the video and Labs completed through the IBM security academy. Now I can apply the knowledge gain as a Threat Hunter. Thanks IBM
автор: DHRUV K
•11 июля 2020 г.
SIEM Concepts and Benefits - First
video is missing, i can hear only the audio in most part of the video.
Kindly, check at your end to avoid problem to the other viewers.
Thank you
автор: Rohan P
•28 июня 2020 г.
This course is really awesome. It gives insightful knowledge with IBM tools and attached resources. Worth it.
автор: Joseph P
•9 июля 2020 г.
Much longer and more in-depth than previous lessons. Quality of videos is much better as well.
автор: Yasir J
•2 июля 2020 г.
This Course was amazing and with bundles of new concepts and technology
автор: ADITYA A
•26 июня 2020 г.
Learned a lot. Great Course. Thank you so much.
автор: ALI E
•18 июня 2020 г.
thank you very appreciated
автор: Md. T U B
•6 июля 2020 г.
excellent
автор: Kaushal A
•1 июля 2020 г.
I"m going to give this course 3*'s because of a few issues. Firstly, The specialization has vanished from Coursera's catalog!. Secondly, the final video before the graded assessment has a lot of audio that makes it feel as if the video/course has been tampered with, and thirdly, the course instructors have a robotic voice, and in the discussion forums don't have a prompt response timing!
But the course contents are really good. Going to have to check my laptop if the weird sounds caused any troubles.
автор: HARSHIT A
•3 янв. 2021 г.
After the lab is started it doesn't takes commands. I am unable to complete lab and unable to get knowledge about the lab.
This is with all the labs not with particular lab. After opening the browser in the windows framework of Lab i am not able to do anything.
Regards
Harshit Agarwal
автор: Evgeniya K
•2 янв. 2021 г.
Very poor presentation of the material.
автор: MOHAMMED V S
•5 мар. 2021 г.
Threat Hunting Overview Knowledge Check
TOTAL POINTS 7
1.
Question 1
Cyber threats pose many challenges to organizations today. Which three (3) of these are among those cited? (Select 3)
1 / 1 point
It takes an average of 191 days to even detect an attack has occurred
Correct
Partially correct!
Almost half of the breaches are caused by malicious or criminal acts
Correct
Partially correct!
There are too few cybersecurity tools available from too few vendors
There is a cybersecurity skills shortage
Correct
Partially correct!
2.
Question 2
What percent of security leaders reported that threat hunting increased the speed and accuracy of response in detection of advanced threats?
1 / 1 point
10%
27%
91%
100%
Correct
Correct!
3.
Question 3
While 80% of the threats are known and detected, the 20% that remains unknown account for what percent of the damage?
1 / 1 point
20%
40%
80%
100%
Correct
Correct!
4.
Question 4
True or False. The skill set of a cyber threat hunter is very different from that of a cybersecurity analyst and many threat hunters a have backrounds doing intelligence work.
1 / 1 point
True
False
Correct
Correct!
5.
Question 5
Your enemy uses a cyber kill chain to plan and execute his attack against your organization. Which three (3) of these are steps in a cyber kill chain? (Select 3)
1 / 1 point
Delivery
Correct
Partially correct!
Weaponization
Correct
Partially correct!
Reconnaissance
Correct
Partially correct!
Negotiation
6.
Question 6
True or False. A cyber threat hunting team generally sits at the center of the SOC Command Center.
1 / 1 point
True
False
Correct
Correct!
7.
Question 7
There is value brought by each of the IBM i2 EIA use cases. Which one of these delivers net new discovery of correlating low level alerts and offenses?
0 / 1 point
Insider Threat
Fraud Investigations
Cyber Threat Hunting
VIP Protection
Incorrect
Incorrect. Perhaps you should review the video Cyber Threat Hunting - An Industry Example.
автор: Jimmy M A
•7 янв. 2022 г.
I am excited for the opportunity to receive such knowledge, education, hands on training which has been building to the level this course is geared to. I realize the value of the learning at the level this course exposes students to. I sometimes feel overwhelmed but each week teaches such valuable knowledge that I realize more and more I am working toward the goals set at the beginning of each course. I can't wait to be able to prove and expand on my abilities, knowledge, and learning and to be able to experience what I have studied for so long now.
автор: Daniel G
•7 окт. 2022 г.
This course armed me with the tools to understand and implement new security practices in my workplace. It also introduced new ways to help me protect myself and my family from potential cyber threats. The only suggestion I would make for people who are interested in taking this course would be to make sure you have a general understanding of Cyber Security terms and a basic understaning of network knowledge. It can be a bit difficult to digest some of the material if you are brand new to Cyber Security.