Об этом курсе
Недавно просмотрено: 122,913

100% онлайн

Начните сейчас и учитесь по собственному графику.

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.

Начальный уровень

Прибл. 20 часа на выполнение

Предполагаемая нагрузка: 17 hours/week...

Английский

Субтитры: Английский

Чему вы научитесь

  • Check

    Discuss the evolution of security based on historical events.

  • Check

    List various types of malicious software.

  • Check

    Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.

  • Check

    Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.

Приобретаемые навыки

Information Security (INFOSEC)IBM New CollarMalwareCybersecurityCyber Attacks

100% онлайн

Начните сейчас и учитесь по собственному графику.

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.

Начальный уровень

Прибл. 20 часа на выполнение

Предполагаемая нагрузка: 17 hours/week...

Английский

Субтитры: Английский

Программа курса: что вы изучите

Неделя
1
5 ч. на завершение

History of Cybersecurity

17 видео ((всего 103 мин.)), 9 материалов для самостоятельного изучения, 7 тестов
17 видео
Welcome to History of Cybersecurity1мин
Cybersecurity Definition3мин
Key Terms1мин
Security Threats2мин
Vulnerability Assessments2мин
Roles in Security4мин
From Ronald Reagan/War Games to where we are Today4мин
The Impact of 9/11 on Cybersecurity10мин
Cybersecurity Today7мин
Cybersecurity Introduction7мин
Things to consider when starting a Cybersecurity program1мин
What is Security?8мин
Additional Security Challenges9мин
Beyond Technology: Critical Thinking in Cybersecurity4мин
Critical Thinking: A Model8мин
Critical Thinking - 5 Key Skills16мин
9 материала для самостоятельного изучения
Earn an IBM digital badge5мин
Your IBM Global Subject Matter Experts10мин
The Insane Amounts of Data We're Using Every Minute (Infographic)10мин
WiCys Organization Resources15мин
The SANS Institute1мин
OWASP - The Open Web Application Project1мин
ISSA - Information Systems Security Association1мин
FIRST- Forum of Incident Response and Security Teams10мин
Additional Cybersecurity Industry Associations25мин
7 практического упражнения
Introduction to Cybersecurity Tools & Cyber Attacks4мин
What are We Talking about when We Talk about Cybersecurity?20мин
From Ronald Reagan to Where we are Today10мин
Cybersecurity Programs10мин
Cybersecurity - A Security Architect's Perspective15мин
What is Critical Thinking?6мин
History of Cybersecurity30мин
Неделя
2
4 ч. на завершение

A brief overview of types of actors and their motives

27 видео ((всего 124 мин.)), 2 материалов для самостоятельного изучения, 7 тестов
27 видео
A brief overview of types of actors and their motives5мин
Hacking organizations3мин
Major different types of cyber attacks6мин
Security Attack Definition7мин
Security services11мин
Security Mechanisms6мин
Network Security Model8мин
Organizational Threats6мин
Attacks6мин
Security Architecture Attacks3мин
Security Architecture -Attack models8мин
Malware and Ransomware3мин
Threat Examples1мин
Threat Protection Defined2мин
Internet Security Threats - Mapping2мин
Internet Security Threats - Packet Sniffing2мин
Security Threat - IP Spoofing1мин
Security Threats - Denial of service2мин
Security Attacks - Host insertions3мин
The Cyber Kill Chain5мин
What is Social Engineering?4мин
Social Engineering - Phishing and Vishing3мин
Cyberwarfare6мин
Cybercrime Resources4мин
X-Force Command Center Introduction2мин
Javier's perspective on Cybersecurity Skills1мин
2 материала для самостоятельного изучения
2019 Ponemon Institute Study on the Cyber Resilient Organization10мин
X-Force Research20мин
7 практического упражнения
Types of Actors and their Motives10мин
An Architect's perspective on attack classifications20мин
Malware and an introduction to threat protection10мин
Additional Attack examples today10мин
Attacks and Cyber resources10мин
A day in the life of a SOC analyst2мин
A brief overview of types of actors and their motives50мин
Неделя
3
3 ч. на завершение

An overview of key security concepts

14 видео ((всего 67 мин.)), 4 материалов для самостоятельного изучения, 5 тестов
14 видео
CIA Triad - Confidentiality2мин
CIA Triad - Integrity6мин
CIA Triad - Availability3мин
Non - Repudiation - How does it apply to CIA?2мин
Access Management4мин
Incidence Response5мин
Key Concepts - Incident Response7мин
Incident Response Process7мин
Introduction to Frameworks and Best Practices4мин
IT Governance Process5мин
Cybersecurity Compliance and Audit Overview7мин
Pentest Process and Mile 2 CPTE Training5мин
OWASP framework2мин
4 материала для самостоятельного изучения
OWASP Top 10 Project Findings 201715мин
National Institute of Standards & Technology15мин
National Initiative For Cybersecurity Education15мин
Computer Security Incident Handling Guide20мин
5 практического упражнения
CIA Triad8мин
Access Management2мин
Incident Response6мин
Frameworks and their purpose10мин
Quiz: Key concepts35мин
Неделя
4
3 ч. на завершение

An overview of key security tools

16 видео ((всего 68 мин.)), 2 материалов для самостоятельного изучения, 5 тестов
16 видео
Introduction to Firewalls2мин
Firewalls - Packet Filtering2мин
Firewalls - Application Gateway4мин
Firewalls - XML Gateway2мин
Firewalls - Stateless and Stateful3мин
Antivirus/Antimalware1мин
An introduction of Cryptography5мин
Types of Cryptography5мин
Cryptographic Attacks2мин
Cryptography - a different perspective from a Security architect14мин
Penetration Testing Introduction6мин
Pentest Methodologies9мин
Vulnerability Tests4мин
What is Digital Forensics?4мин
Conclusion24
2 материала для самостоятельного изучения
Securityintelligence.com25мин
Incident Response and Digital Forensics: Will You Buy or Build?10мин
5 практического упражнения
Firewalls10мин
Antivirus/Antimalware5мин
Introduction to Cryptography12мин
First look at Penetration Testing and Digital Forensics8мин
Key security tools25мин
4.5
Рецензии: 51Chevron Right

Лучшие отзывы о курсе Introduction to Cybersecurity Tools & Cyber Attacks

автор: SZNov 7th 2019

I appreciate the chance to learn fundamentals of cyber security with you.\n\nThe vast number of topics made it pretty interesting for me and I couldn't wait to learn more.\n\nSincerely, Sadra Zargar

автор: LSOct 7th 2019

course is good but the problem occurs because of asginment, because there is many right answer in option so student get confuse and sometimes wrong answers are right.

Преподаватели

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

О IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

Специализация IT Fundamentals for Cybersecurity: общие сведения

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Часто задаваемые вопросы

  • Зарегистрировавшись на сертификацию, вы получите доступ ко всем видео, тестам и заданиям по программированию (если они предусмотрены). Задания по взаимной оценке сокурсниками можно сдавать и проверять только после начала сессии. Если вы проходите курс без оплаты, некоторые задания могут быть недоступны.

  • Записавшись на курс, вы получите доступ ко всем курсам в специализации, а также возможность получить сертификат о его прохождении. После успешного прохождения курса на странице ваших достижений появится электронный сертификат. Оттуда его можно распечатать или прикрепить к профилю LinkedIn. Просто ознакомиться с содержанием курса можно бесплатно.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

Остались вопросы? Посетите Центр поддержки учащихся.