이 강좌에 대하여

최근 조회 727,018

학습자 경력 결과

33%

가 이 강좌를 통해 확실한 경력상 이점을 얻음

50%

가 급여 인상 또는 승진 성취
공유 가능한 수료증
완료 시 수료증 획득
100% 온라인
지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.
유동적 마감일
일정에 따라 마감일을 재설정합니다.
초급 단계
완료하는 데 약 20시간 필요
영어

배울 내용

  • Discuss the evolution of security based on historical events.

  • List various types of malicious software.

  • Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.

  • Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.

귀하가 습득할 기술

Information Security (INFOSEC)IBM New CollarMalwareCybersecurityCyber Attacks

학습자 경력 결과

33%

가 이 강좌를 통해 확실한 경력상 이점을 얻음

50%

가 급여 인상 또는 승진 성취
공유 가능한 수료증
완료 시 수료증 획득
100% 온라인
지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.
유동적 마감일
일정에 따라 마감일을 재설정합니다.
초급 단계
완료하는 데 약 20시간 필요
영어

제공자:

Placeholder

IBM

강의 계획 - 이 강좌에서 배울 내용

콘텐츠 평가Thumbs Up91%(25,608개의 평가)Info
1

1

완료하는 데 5시간 필요

History of Cybersecurity

완료하는 데 5시간 필요
17개 동영상 (총 103분), 9 개의 읽기 자료, 7 개의 테스트
17개의 동영상
Welcome to History of Cybersecurity1m
Cybersecurity Definition3m
Key Terms1m
Security Threats2m
Vulnerability Assessments2m
Roles in Security4m
From Ronald Reagan/War Games to where we are Today4m
The Impact of 9/11 on Cybersecurity10m
Cybersecurity Today7m
Cybersecurity Introduction7m
Things to consider when starting a Cybersecurity program1m
What is Security?8m
Additional Security Challenges9m
Beyond Technology: Critical Thinking in Cybersecurity4m
Critical Thinking: A Model8m
Critical Thinking - 5 Key Skills16m
9개의 읽기 자료
Earn an IBM digital badge5m
Your IBM Global Subject Matter Experts10m
The Insane Amounts of Data We're Using Every Minute (Infographic)10m
WiCys Organization Resources15m
The SANS Institute1m
OWASP - The Open Web Application Project1m
ISSA - Information Systems Security Association1m
FIRST- Forum of Incident Response and Security Teams10m
Additional Cybersecurity Industry Associations25m
7개 연습문제
Introduction to Cybersecurity Tools & Cyber Attacks30m
What are We Talking about when We Talk about Cybersecurity?20m
From Ronald Reagan to Where we are Today10m
Cybersecurity Programs10m
Cybersecurity - A Security Architect's Perspective15m
What is Critical Thinking?30m
History of Cybersecurity30m
2

2

완료하는 데 6시간 필요

A brief overview of types of actors and their motives

완료하는 데 6시간 필요
27개 동영상 (총 124분), 2 개의 읽기 자료, 7 개의 테스트
27개의 동영상
A brief overview of types of actors and their motives5m
Hacking organizations3m
Major different types of cyber attacks6m
Security Attack Definition7m
Security services11m
Security Mechanisms6m
Network Security Model8m
Organizational Threats6m
Attacks6m
Security Architecture Attacks3m
Security Architecture -Attack models8m
Malware and Ransomware3m
Threat Examples1m
Threat Protection Defined2m
Internet Security Threats - Mapping2m
Internet Security Threats - Packet Sniffing2m
Security Threat - IP Spoofing1m
Security Threats - Denial of service2m
Security Attacks - Host insertions3m
The Cyber Kill Chain5m
What is Social Engineering?4m
Social Engineering - Phishing and Vishing3m
Cyberwarfare6m
Cybercrime Resources4m
X-Force Command Center Introduction2m
Javier's perspective on Cybersecurity Skills1m
2개의 읽기 자료
2019 Ponemon Institute Study on the Cyber Resilient Organization10m
X-Force Research20m
7개 연습문제
Types of Actors and their Motives30m
An Architect's perspective on attack classifications20m
Malware and an introduction to threat protection30m
Additional Attack examples today30m
Attacks and Cyber resources10m
A day in the life of a SOC analyst30m
A brief overview of types of actors and their motives50m
3

3

완료하는 데 5시간 필요

An overview of key security concepts

완료하는 데 5시간 필요
14개 동영상 (총 67분), 4 개의 읽기 자료, 5 개의 테스트
14개의 동영상
CIA Triad - Confidentiality2m
CIA Triad - Integrity6m
CIA Triad - Availability3m
Non - Repudiation - How does it apply to CIA?2m
Access Management4m
Incidence Response5m
Key Concepts - Incident Response7m
Incident Response Process7m
Introduction to Frameworks and Best Practices4m
IT Governance Process5m
Cybersecurity Compliance and Audit Overview7m
Pentest Process and Mile 2 CPTE Training5m
OWASP framework2m
4개의 읽기 자료
OWASP Top 10 Project Findings 201715m
National Institute of Standards & Technology15m
National Initiative For Cybersecurity Education15m
Computer Security Incident Handling Guide20m
5개 연습문제
CIA Triad30m
Access Management30m
Incident Response30m
Frameworks and their purpose30m
Quiz: Key concepts35m
4

4

완료하는 데 3시간 필요

An overview of key security tools

완료하는 데 3시간 필요
16개 동영상 (총 68분), 2 개의 읽기 자료, 5 개의 테스트
16개의 동영상
Introduction to Firewalls2m
Firewalls - Packet Filtering2m
Firewalls - Application Gateway4m
Firewalls - XML Gateway2m
Firewalls - Stateless and Stateful3m
Antivirus/Antimalware1m
An introduction of Cryptography5m
Types of Cryptography5m
Cryptographic Attacks2m
Cryptography - a different perspective from a Security architect14m
Penetration Testing Introduction6m
Pentest Methodologies9m
Vulnerability Tests4m
What is Digital Forensics?4m
Conclusion24
2개의 읽기 자료
Securityintelligence.com25m
Incident Response and Digital Forensics: Will You Buy or Build?10m
5개 연습문제
Firewalls30m
Antivirus/Antimalware5m
Introduction to Cryptography12m
First look at Penetration Testing and Digital Forensics30m
Key security tools25m

검토

INTRODUCTION TO CYBERSECURITY TOOLS & CYBER ATTACKS의 최상위 리뷰

모든 리뷰 보기

자주 묻는 질문

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.