課程信息
139,060 次近期查看

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

初級

完成時間大約為19 小時

建議:20 hours/week...

英語(English)

字幕:英語(English)

您將學到的內容有

  • Check

    Discuss the evolution of security based on historical events.

  • Check

    List various types of malicious software.

  • Check

    Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.

  • Check

    Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.

您將獲得的技能

Information Security (INFOSEC)IBM New CollarMalwareCybersecurityCyber Attacks

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

初級

完成時間大約為19 小時

建議:20 hours/week...

英語(English)

字幕:英語(English)

學習Course的學生是

  • Security Engineers
  • Technical Solutions Engineers
  • Technical Support Associates
  • Machine Learning Engineers
  • Account Managers

教學大綱 - 您將從這門課程中學到什麼

1
完成時間為 5 小時

History of Cybersecurity

17 個視頻 (總計 103 分鐘), 9 個閱讀材料, 7 個測驗
17 個視頻
Welcome to History of Cybersecurity1分鐘
Cybersecurity Definition3分鐘
Key Terms1分鐘
Security Threats2分鐘
Vulnerability Assessments2分鐘
Roles in Security4分鐘
From Ronald Reagan/War Games to where we are Today4分鐘
The Impact of 9/11 on Cybersecurity10分鐘
Cybersecurity Today7分鐘
Cybersecurity Introduction7分鐘
Things to consider when starting a Cybersecurity program1分鐘
What is Security?8分鐘
Additional Security Challenges9分鐘
Beyond Technology: Critical Thinking in Cybersecurity4分鐘
Critical Thinking: A Model8分鐘
Critical Thinking - 5 Key Skills16分鐘
9 個閱讀材料
Earn an IBM digital badge5分鐘
Your IBM Global Subject Matter Experts10分鐘
The Insane Amounts of Data We're Using Every Minute (Infographic)10分鐘
WiCys Organization Resources15分鐘
The SANS Institute1分鐘
OWASP - The Open Web Application Project1分鐘
ISSA - Information Systems Security Association1分鐘
FIRST- Forum of Incident Response and Security Teams10分鐘
Additional Cybersecurity Industry Associations25分鐘
7 個練習
Introduction to Cybersecurity Tools & Cyber Attacks4分鐘
What are We Talking about when We Talk about Cybersecurity?20分鐘
From Ronald Reagan to Where we are Today10分鐘
Cybersecurity Programs10分鐘
Cybersecurity - A Security Architect's Perspective15分鐘
What is Critical Thinking?6分鐘
History of Cybersecurity30分鐘
2
完成時間為 4 小時

A brief overview of types of actors and their motives

27 個視頻 (總計 124 分鐘), 2 個閱讀材料, 7 個測驗
27 個視頻
A brief overview of types of actors and their motives5分鐘
Hacking organizations3分鐘
Major different types of cyber attacks6分鐘
Security Attack Definition7分鐘
Security services11分鐘
Security Mechanisms6分鐘
Network Security Model8分鐘
Organizational Threats6分鐘
Attacks6分鐘
Security Architecture Attacks3分鐘
Security Architecture -Attack models8分鐘
Malware and Ransomware3分鐘
Threat Examples1分鐘
Threat Protection Defined2分鐘
Internet Security Threats - Mapping2分鐘
Internet Security Threats - Packet Sniffing2分鐘
Security Threat - IP Spoofing1分鐘
Security Threats - Denial of service2分鐘
Security Attacks - Host insertions3分鐘
The Cyber Kill Chain5分鐘
What is Social Engineering?4分鐘
Social Engineering - Phishing and Vishing3分鐘
Cyberwarfare6分鐘
Cybercrime Resources4分鐘
X-Force Command Center Introduction2分鐘
Javier's perspective on Cybersecurity Skills1分鐘
2 個閱讀材料
2019 Ponemon Institute Study on the Cyber Resilient Organization1分鐘
X-Force Research20分鐘
7 個練習
Types of Actors and their Motives10分鐘
An Architect's perspective on attack classifications20分鐘
Malware and an introduction to threat protection10分鐘
Additional Attack examples today10分鐘
Attacks and Cyber resources10分鐘
A day in the life of a SOC analyst2分鐘
A brief overview of types of actors and their motives50分鐘
3
完成時間為 3 小時

An overview of key security concepts

14 個視頻 (總計 67 分鐘), 4 個閱讀材料, 5 個測驗
14 個視頻
CIA Triad - Confidentiality2分鐘
CIA Triad - Integrity6分鐘
CIA Triad - Availability3分鐘
Non - Repudiation - How does it apply to CIA?2分鐘
Access Management4分鐘
Incidence Response5分鐘
Key Concepts - Incident Response7分鐘
Incident Response Process7分鐘
Introduction to Frameworks and Best Practices4分鐘
IT Governance Process5分鐘
Cybersecurity Compliance and Audit Overview7分鐘
Pentest Process and Mile 2 CPTE Training5分鐘
OWASP framework2分鐘
4 個閱讀材料
OWASP Top 10 Project Findings 201715分鐘
National Institute of Standards & Technology15分鐘
National Initiative For Cybersecurity Education15分鐘
Computer Security Incident Handling Guide20分鐘
5 個練習
CIA Triad8分鐘
Access Management2分鐘
Incident Response6分鐘
Frameworks and their purpose10分鐘
Quiz: Key concepts35分鐘
4
完成時間為 3 小時

An overview of key security tools

16 個視頻 (總計 68 分鐘), 2 個閱讀材料, 5 個測驗
16 個視頻
Introduction to Firewalls2分鐘
Firewalls - Packet Filtering2分鐘
Firewalls - Application Gateway4分鐘
Firewalls - XML Gateway2分鐘
Firewalls - Stateless and Stateful3分鐘
Antivirus/Antimalware1分鐘
An introduction of Cryptography5分鐘
Types of Cryptography5分鐘
Cryptographic Attacks2分鐘
Cryptography - a different perspective from a Security architect14分鐘
Penetration Testing Introduction6分鐘
Pentest Methodologies9分鐘
Vulnerability Tests4分鐘
What is Digital Forensics?4分鐘
Conclusion24
2 個閱讀材料
Securityintelligence.com25分鐘
Incident Response and Digital Forensics: Will You Buy or Build?10分鐘
5 個練習
Firewalls10分鐘
Antivirus/Antimalware5分鐘
Introduction to Cryptography12分鐘
First look at Penetration Testing and Digital Forensics8分鐘
Key security tools25分鐘
4.5
18 個審閱Chevron Right

來自Introduction to Cybersecurity Tools & Cyber Attacks的熱門評論

創建者 ASSep 11th 2019

Thanks to the respected instructors to teach me the fundamental and most important concepts of Cyber Security

創建者 AHSep 17th 2019

Build in a way that is Introductory for those new to the field.

講師

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

關於 IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

關於 IT Fundamentals for Cybersecurity 專項課程

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

還有其他問題嗎?請訪問 學生幫助中心