Chevron Left
Back to Cybersecurity Roles, Processes & Operating System Security

Learner Reviews & Feedback for Cybersecurity Roles, Processes & Operating System Security by IBM

4.6
stars
5,348 ratings

About the Course

This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: ● Understand the key cybersecurity roles within an Organization. ● List key cybersecurity processes and an example of each process. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile. ● Understand the concept of Virtualization as it relates to cybersecurity Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-roles-processes-operating-system-security...

Top reviews

MG

Apr 24, 2020

Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!

TC

May 10, 2020

Knowledge delivery is exceptional. Content is to the point and the tests really pinpoint the attention level of the volunteer taking the course.Thank you for designing such a knowledgeable course

Filter by:

726 - 750 of 1,053 Reviews for Cybersecurity Roles, Processes & Operating System Security

By Chrystalla I

Feb 9, 2022

.

By Saood A

Aug 29, 2021

5

By Chandrashekara K

Dec 23, 2020

g

By Alexis P

Nov 21, 2020

E

By Raj D

Aug 6, 2020

A

By Kapil C

Jul 20, 2020

.

By Yusri A

Aug 23, 2023

In an increasingly digital world, the imperative for robust cybersecurity practices has never been more evident. "Comprehensive Insights into Cybersecurity Roles, Processes, and Operating System Security" presents a meticulous exploration of the dynamic landscape of cybersecurity, shedding light on essential roles, intricate processes, and the critical realm of operating system security.

The authors' deep understanding of the subject matter is palpable throughout the text. Their systematic approach to delineating various cybersecurity roles provides an invaluable resource for individuals and organizations striving to comprehend the multifaceted responsibilities that safeguard our digital realm. From the proactive vigilance of penetration testers to the strategic oversight of security architects, each role is dissected with clarity and precision.

The book's real strength, however, lies in its elucidation of cybersecurity processes. In a field where methodologies can make or break an organization's defense mechanisms, the authors offer a comprehensive overview of the processes that underpin a resilient cybersecurity infrastructure. Whether it's the intricacies of threat hunting, incident response, or vulnerability management, the text navigates these processes deftly, making it an indispensable guide for practitioners and students alike.

A significant portion of the book is dedicated to operating system security, and rightly so. Operating systems serve as the bedrock of digital operations, and their protection is paramount. The authors delve deep into the core principles of OS security, from access controls and authentication mechanisms to secure boot processes. In an era marked by rampant cyber threats, this section equips readers with the knowledge needed to fortify their systems against an array of potential vulnerabilities.

While the book excels in many aspects, there are a few areas where it could be further enhanced. The rapidly evolving nature of cybersecurity necessitates a continuous update cycle, and a companion website or online resources could provide readers with the latest insights and emerging trends. Additionally, more practical examples, case studies, and hands-on exercises would empower readers to apply the theoretical knowledge gained from the text.

In conclusion, "Comprehensive Insights into Cybersecurity Roles, Processes, and Operating System Security" stands as a commendable contribution to the cybersecurity literature. Its meticulous exploration of roles, processes, and operating system security, combined with the authors' evident expertise, makes it an essential read for both novices seeking to enter the field and seasoned professionals aiming to bolster their knowledge. With a few enhancements, this book could become an unrivaled companion in the journey toward a more secure digital landscape.

By La V D S

Apr 14, 2021

A great experience with Coursera once again as I have access to the learning resources at anytime and I can learn at my own pace; the concepts are explained with so much clarity and examples which makes it easy to understand. I am taking a break for a week to review the first two courses for a better understanding but also to rest my brain and then I will take the third one.

The way the courses are presented almost made me addicted in a way that I just wanted to go the hear what next, what next and what next until I finished in 2 courses in 4 days each while they are designed to complete in 4 weeks, I could study for 16 hours in a row, wow.

Thanks

By Tania V C D

Jan 30, 2021

I learned a lot in this course, the professors know a lot about the topics, give some interesting examples, and explain as clearly as possible. About the quizzes, some questions were quite easy but the main one, which evaluates the knowledge learned throughout a full module, summarizes very well the key ideas. The only issue I found is the class material, the quality of the slides is not good and we don't access to those, also the quality of the audio sometimes was not the best which interrupts the understanding of some key ideas. In general, is a good course.

By Emad M

Feb 10, 2023

Definitely better than the first IBM course "Introduction to cyber security" , more focused on points . better instructors , better audio and overall quality , but still needs some improvement in the quality

the course is actually pretty easy (even if u don't have a background in cyber security) i don't recommend u taking it unless your gonna finish the whole 8 courses of IBM and take the professional certificate at the end , the knowledge given by this course is basic and u cant find it anywhere else with even a better Presentation and for free

By Renaud L

Sep 4, 2019

"Cybersecurity Roles, Processes, and OS Security" contained some redundant material (in week 1 and 2) from the previous course, "Introduction to Cybersecurity Tools and Cyber Attacks", regarding access management and CIA triade. However, weeks 3 and 4 on OS and virtualization were good introductions. I would suggest to add more security material regarding Windows and Linux however, because there is barely anything about it. The title of the course is thus slightly misleading.

By Naif A

Oct 12, 2020

A good amount of the videos are not clear audio-wise and visually, some of the things are INAUDIBLE and the transcripts in those cases do not help at all. I think it would be better off for you guys and for us to update the videos with a higher resolution and a better speaker or at least for that speaker to speak through a more CLEAR microphone and take their time when saying the terms.

By 유승우

Mar 15, 2022

I could find out knowledges about process, service operation, security strategy, etc. It helps definitely.

However, the test of the first week looks like unnecessarily difficult. I took it more than five times to pass. The lectures in the first week were not that clear to take the test with them.

I think the test of the first week needs the adjustment.

By Zibusiso B

Jan 21, 2022

In the Google IT Support Professional Course I was exposed to most of the concepts in the Operating Systems. It was refreshing and also befitting to get a timely reminder of the everyday processes that we do without knowing the technological terms of what is transpiring and it has made my awareness greater.

By Varun C

Feb 23, 2021

This course is a good choice to get yourself through some of the basic concepts and knowledge about Cybersecurity Roles, Processes & Operating System Security. I would suggest to explore each topic more on google since the topics are discussed in brief and there is lot of things you can get to know

By Tracey J

Jun 11, 2020

I think it is really a 4.5 stars out of 5. The pictures and images were difficult to see during the lectures. They were blurry at times. And I think there might have been more than one correct answer on questions 5 and 9 of the Windows Security Operation Security Basics. Quiz.

By Ran M

Jan 18, 2021

A lot of the slides are very blurry and most of the videos have a very low volume.

It makes it very hard to study and very hard to concentrate.

Overall the subject matter experts are very good and very informative this was the main reason i rated this course with 4 stars and not 3.

By Prashant K

Aug 16, 2020

I would give 5 stars to the course contents. Two things did upset me, the first is pace of one of the instructors, which was not very much easy to be with and the second one is the transcript, which sometimes was very much wrong. Anyhow, it was amusing to join this course.

By Said R A

Oct 27, 2021

It was an amazing course. Video explanation are very clear. It makes it easy to understand the course. I didn't know what I was jumping into but with this course it helps you to understand the base of cyber security and provide a general knowledge of computer science.

By shubham w

Oct 3, 2020

The Content Was Nicely Explained, It just made me easy to understand the concept of cloud security, Governance, Types Of controls, File Systems in Different Operating System. It is good course to learns Security Basics and Upskill your Knowledge. Thank You!

By Jeff J

Jan 18, 2020

This course covered the CIA triad a bit deeper and also gave a good overview of security for Windows, Linux, and Virtualization. I learned something new even though I already had a good grasp on these topics. Thank you for the course. Best regards, Jeff

By Vlad W

Oct 2, 2020

This one was easier than I expected. Still, only general structural information provided with a number of very good resources for the future. Mainly very poor pictures quality but the overall information is well structured and well presented.

By Mehboob u R

Mar 10, 2021

Wonderful compilation of resources. I really enjoyed, since it is designed as very light weight specially for those professional who would like to pursue as continuing education and enhancing skills while also doing their job. Thank you.

By Ahmed A

Sep 4, 2020

An overall better course than the first one, but many of the videos are still lacking in quality. Also, I really still do not see any thing that justifies the price tag. Except for the certificate itself, if that is all what you are after.

By Tagieva T T q

Aug 20, 2020

In general the course was informative and interesting, however sometimes the quality of recording wasn not so good , so it was difficult to understand the concept from the first time.Thank you for the course, it was very useful for me!