About this Course
최근 조회 10,392

다음 전문 분야의 4개 강좌 중 1번째 강좌:

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 마감일

일정에 따라 마감일을 재설정합니다.

초급 단계

영어

자막: 영어

배울 내용

  • Check

    Discuss the evolution of security based on historical events.

  • Check

    List various types of malicious software.

  • Check

    Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.

  • Check

    Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.

귀하가 습득할 기술

Information Security (INFOSEC)IBM New CollarMalwareCybersecurityCyber Attacks

다음 전문 분야의 4개 강좌 중 1번째 강좌:

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 마감일

일정에 따라 마감일을 재설정합니다.

초급 단계

영어

자막: 영어

강의 계획 - 이 강좌에서 배울 내용

1
완료하는 데 5시간 필요

History of Cybersecurity

This module will give you a brief overview of the history of cybersecurity. You will also learn key terms and roles in cybersecurity.

...
17 videos (Total 103 min), 9 readings, 7 quizzes
17개의 동영상
Key Terms1m
Security Threats2m
Vulnerability Assessments2m
Roles in Security4m
From Ronald Reagan/War Games to where we are Today4m
The Impact of 9/11 on Cybersecurity10m
Cybersecurity Today7m
Cybersecurity Introduction7m
Things to consider when starting a Cybersecurity program1m
What is Security?8m
Additional Security Challenges9m
Beyond Technology: Critical Thinking in Cybersecurity4m
Critical Thinking: A Model8m
Critical Thinking - 5 Key Skills16m
9개의 읽기 자료
Earn an IBM digital badge5m
Your IBM Global Subject Matter Experts10m
The Insane Amounts of Data We're Using Every Minute (Infographic)10m
WiCys Organization Resources15m
The SANS Institute1m
OWASP - The Open Web Application Project1m
ISSA - Information Systems Security Association1m
FIRST- Forum of Incident Response and Security Teams10m
Additional Cybersecurity Industry Associations25m
7개 연습문제
Introduction to Cybersecurity Tools & Cyber Attacks4m
What are We Talking about when We Talk about Cybersecurity?20m
From Ronald Reagan to Where we are Today10m
Cybersecurity Programs10m
Cybersecurity - A Security Architect's Perspective15m
What is Critical Thinking?6m
History of Cybersecurity30m
2
완료하는 데 4시간 필요

A brief overview of types of actors and their motives

This module will provide you with a brief overview of types of actors and their motives. You will also understand different types of attacks and their impact on an organization and individuals. You will also learn about tools that are available to you to assist in any cybersecurity investigation.

...
27 videos (Total 124 min), 2 readings, 7 quizzes
27개의 동영상
Major different types of cyber attacks6m
Security Attack Definition7m
Security services11m
Security Mechanisms6m
Network Security Model8m
Organizational Threats6m
Attacks6m
Security Architecture Attacks3m
Security Architecture -Attack models8m
Malware and Ransomware3m
Threat Examples1m
Threat Protection Defined2m
Internet Security Threats - Mapping2m
Internet Security Threats - Packet Sniffing2m
Security Threat - IP Spoofing1m
Security Threats - Denial of service2m
Security Attacks - Host insertions3m
The Cyber Kill Chain5m
What is Social Engineering?4m
Social Engineering - Phishing and Vishing3m
Cyberwarfare6m
Cybercrime Resources4m
X-Force Command Center Introduction2m
Javier's perspective on Cybersecurity Skills1m
2개의 읽기 자료
2019 Ponemon Institute Study on the Cyber Resilient Organization1m
X-Force Research20m
7개 연습문제
Types of Actors and their Motives10m
An Architect's perspective on attack classifications20m
Malware and an introduction to threat protection10m
Additional Attack examples today10m
Attacks and Cyber resources10m
A day in the life of a SOC analyst2m
A brief overview of types of actors and their motives50m
3
완료하는 데 3시간 필요

An overview of key security concepts

This module will describe various key security concepts that are important in any cybersecurity position. The CIA Triad will be further explained. You will also begin to learn the significance of incident response and frameworks around cybersecurity. Finally, you will get an overview of IT Governance best practices and compliance.

...
14 videos (Total 67 min), 4 readings, 5 quizzes
14개의 동영상
CIA Triad - Availability3m
Non - Repudiation - How does it apply to CIA?2m
Access Management4m
Incidence Response5m
Key Concepts - Incident Response7m
Incident Response Process7m
Introduction to Frameworks and Best Practices4m
IT Governance Process5m
Cybersecurity Compliance and Audit Overview7m
Pentest Process and Mile 2 CPTE Training5m
OWASP framework2m
4개의 읽기 자료
OWASP Top 10 Project Findings 201715m
National Institute of Standards & Technology15m
National Initiative For Cybersecurity Education15m
Computer Security Incident Handling Guide20m
5개 연습문제
CIA Triad8m
Access Management2m
Incident Response6m
Frameworks and their purpose10m
Quiz: Key concepts35m
4
완료하는 데 3시간 필요

An overview of key security tools

In this module, you will be introduced to key security tools including firewalls, anti-virus and cryptography. You will explore penetration testing and digital forensics. You will learn where you can get resources on industry and current threats to assist in further research around cybersecurity.

...
16 videos (Total 68 min), 2 readings, 5 quizzes
16개의 동영상
Firewalls - Application Gateway4m
Firewalls - XML Gateway2m
Firewalls - Stateless and Stateful3m
Antivirus/Antimalware1m
An introduction of Cryptography5m
Types of Cryptography5m
Cryptographic Attacks2m
Cryptography - a different perspective from a Security architect14m
Penetration Testing Introduction6m
Pentest Methodologies9m
Vulnerability Tests4m
What is Digital Forensics?4m
Conclusion24
2개의 읽기 자료
Securityintelligence.com25m
Incident Response and Digital Forensics: Will You Buy or Build?10m
5개 연습문제
Firewalls10m
Antivirus/Antimalware5m
Introduction to Cryptography12m
First look at Penetration Testing and Digital Forensics8m
Key security tools25m

강사

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

IBM 정보

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

IT Fundamentals for Cybersecurity 전문 분야 정보

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

자주 묻는 질문

  • 강좌에 등록하면 바로 모든 비디오, 테스트 및 프로그래밍 과제(해당하는 경우)에 접근할 수 있습니다. 상호 첨삭 과제는 이 세션이 시작된 경우에만 제출하고 검토할 수 있습니다. 강좌를 구매하지 않고 살펴보기만 하면 특정 과제에 접근하지 못할 수 있습니다.

  • 강좌를 등록하면 전문 분야의 모든 강좌에 접근할 수 있고 강좌를 완료하면 수료증을 취득할 수 있습니다. 전자 수료증이 성취도 페이지에 추가되며 해당 페이지에서 수료증을 인쇄하거나 LinkedIn 프로필에 수료증을 추가할 수 있습니다. 강좌 내용만 읽고 살펴보려면 해당 강좌를 무료로 청강할 수 있습니다.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.