課程信息
4,020 次近期查看

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

完成時間大約為16 小時

建議:13 hours/week...

英語(English)

字幕:英語(English)

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

完成時間大約為16 小時

建議:13 hours/week...

英語(English)

字幕:英語(English)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間為 2 小時

People Process & Technology

This module will take you through a typical Security organization. You will also learn about the service management framework and how it affects how an organization will use this framework to avoid or react to cybersecurity attacks. You will also research ITIL standard processes.

...
9 個視頻 (總計 48 分鐘), 4 個閱讀材料, 4 個測驗
9 個視頻
Overview of People, Process and Technologies1分鐘
What is IT Security?42
Frameworks and their purpose4分鐘
Roles in Security4分鐘
Introduction to Process4分鐘
Business Process Management Overview14分鐘
Information Technology Infrastructure Library (ITIL) Overview9分鐘
Key ITIL Processes6分鐘
4 個閱讀材料
Earn an IBM digital badge5分鐘
Your Subject Matter Experts10分鐘
ITIL framework30分鐘
What is IT Service Management?15分鐘
4 個練習
Welcome to People, Process and Operating System Fundamentals for Cybersecurity4分鐘
Frameworks, Policies and Roles4分鐘
Business Process Management and IT Infrastructure Library Basics8分鐘
People, Process and Technology20分鐘
2
完成時間為 2 小時

Examples & Principles of the CIA Triad

This module will explain what is the CIA Triad and how is it important to cybersecurity concepts and practice.

...
5 個視頻 (總計 16 分鐘), 1 個閱讀材料, 2 個測驗
5 個視頻
Who are Alice, Bob and Trudy?3分鐘
Confidentiality, Integrity and Availability9分鐘
Authenticity and Accountability1分鐘
Priscilla Mariel Guzman Angulo - What's important for my job.1分鐘
1 個閱讀材料
Threat Horizon 2019: Disruption. Distortion. Deterioration1小時
2 個練習
Further discussion of confidentiality, integrity and availability6分鐘
Principles of the CIA Triad10分鐘
完成時間為 1 小時

Authentication and Access Control

In this module you will learn the importance of authentication and identification. You will also learn how access controls both physical and logical help safeguard an organization. You will also investigate an identified risk around access control.

...
5 個視頻 (總計 23 分鐘), 1 個閱讀材料, 3 個測驗
5 個視頻
Identification and AAA7分鐘
Access Control Methods3分鐘
Access Control - Physical and Logical6分鐘
Open Web Application Security Project (OWASP)3分鐘
1 個閱讀材料
OWASP Top 10 Project20分鐘
3 個練習
What is AAA?4分鐘
Access Control4分鐘
Authentication and Access control15分鐘
3
完成時間為 1 小時

Windows Operating System Security Basics

In this module you will learn about the file system and directory structures for the Windows operating system. You will also learn about many shortcuts and commands which will help you to navigate the Windows system to gather information and reduce your work time.

...
6 個視頻 (總計 28 分鐘), 4 個測驗
6 個視頻
User and Kernel Mode4分鐘
File Systems3分鐘
Directory Structure6分鐘
Shortcuts and Commands5分鐘
Additional Shortcuts6分鐘
4 個練習
User and Kernel Modes2分鐘
File Systems and Directory Structure4分鐘
Shortcuts and Commands4分鐘
Windows Operating System Security Basics20分鐘
完成時間為 1 小時

Linux Operating System Security Basics

In this module you will learn the key components of the Linux operating system and basic commands required to assist you in accessing information that pertains to the security of your systems. You will also access Pentestmonkey a resource many cybersecurity professionals use to access cheat sheets about certain cybersecurity vulnerabilities and investigations.

...
4 個視頻 (總計 21 分鐘), 1 個閱讀材料, 4 個測驗
4 個視頻
File Systems6分鐘
Basic Commands5分鐘
Permissions and Owners6分鐘
1 個閱讀材料
Pentestmonkey research20分鐘
4 個練習
Key Components2分鐘
File systems2分鐘
Linux Basic Commands4分鐘
Linux Operating System security basics20分鐘
完成時間為 1 小時

macOS Security Basics

In this module you will learn how to find resources around MAC/OS. You will read documentation from Apple around the security framework and how to investigate additional information through the eyes of a developer.

...
1 個視頻 (總計 1 分鐘), 1 個閱讀材料
1 個視頻
1 個閱讀材料
macOS Developer resources45分鐘
4
完成時間為 1 小時

Overview of Virtualization

In this module, you will learn the basics of virtualization and cloud computing. You will also learn about cloud computing governance, security and benefits.

...
6 個視頻 (總計 30 分鐘), 2 個閱讀材料, 2 個測驗
6 個視頻
An Overview of Virtualization3分鐘
Virtualization to Cloud4分鐘
What is Cloud Computing?12分鐘
Cloud Benefits, Security and Governance7分鐘
Wrap up20
2 個閱讀材料
SANS Institute research exercise3分鐘
Differences between virtualization and cloud - RedHat20分鐘
2 個練習
Virtualization Basics and Cloud Computing12分鐘
Virtualization Basics15分鐘

講師

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

關於 IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

關於 IT Fundamentals for Cybersecurity 專項課程

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

還有其他問題嗎?請訪問 學生幫助中心