Chevron Left
返回到 Cybersecurity Capstone: Breach Response Case Studies

学生对 IBM 提供的 Cybersecurity Capstone: Breach Response Case Studies 的评价和反馈

4.8
387 个评分
72 条评论

课程概述

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization. Finally, you will explore the costs of data breaches through research studies and well known breaches. This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the seventh and final course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cybersecurity-breach-case-studies . In this course, you will learn to: ● Apply incident response methodologies. ● Research and describe a watering hole attack. ● Research and describe ransomware threats and the consequences to organization. ● Research and describe 3rd party breaches and how they affect an organization. ● Research and describe the effects of a phishing attack. ● Research and describe a point of sale attack and approximate cost of data breaches. ● Perform a case study on a current cyber attack and breach....

热门审阅

GM
Apr 26, 2021

Very good material. It is interesting to create a case study.\n\nIt was challenging to find enough material from open sources which can help you built up the scenario.

AD
Sep 2, 2021

It touches on real world cases and make attendants practice and help them how to read news about a a breach in any sources from the web. Thank you

筛选依据:

1 - Cybersecurity Capstone: Breach Response Case Studies 的 25 个评论(共 78 个)

创建者 James H

Jul 9, 2020

there wasn't any teaching. Just someone reading to you.

创建者 adedeji

Jul 1, 2020

I strongly recommend this course for any one/person interested in going into cyber security either as a trainer or practitioner.

创建者 BHABESH K D

Jun 18, 2020

too dificult to make an report or project but it was good experienced.

创建者 Eshan M H

Aug 24, 2020

Content is Very good. Although the Admins could look in to the peer-review process, its very slow and people have to wait days. Of about 100 posts in the discussion forum, more than 95 are people asking why their assignments are not getting reviewed.

创建者 Mohamed M

Jun 26, 2020

Great I like It especially the Case Study Attack Report

创建者 Mark R

Oct 30, 2020

Good exercise to use skills and information obtained through this course to do a real world data breach review.

创建者 GAJENDRA R

Sep 20, 2020

Great course for beginners in Information Security

创建者 ALI E

Jun 20, 2020

thank you, very informative course

创建者 Muhammad Z H

Jul 28, 2020

Thanks

创建者 Julio C M S

Dec 2, 2020

the course is very interesting bz you learned about the risk of a data breach. The reputational risk is very high. also, the financial risk.

创建者 Rakesh P

Nov 24, 2020

The instructions were so clear and many things to learn about the data breaches. It's pretty good.

创建者 Chi W D W

Aug 22, 2020

Thanks for the great course. Very useful and insightful case studies

创建者 Mendelssohn S

Oct 30, 2020

Excellent course! Congratulations to developers!

创建者 babayankee b

Sep 9, 2020

i am really grateful on the knowledge acquired

创建者 Varalakshmi S

Aug 5, 2020

thank you so much............

创建者 Ricardo A A G

Oct 20, 2020

Thanks for everything

创建者 Luis F R L

Dec 15, 2020

Muchas gracias

创建者 Alexey S

Dec 26, 2020

Great course!

创建者 George M

Apr 27, 2021

Very good material. It is interesting to create a case study.

It was challenging to find enough material from open sources which can help you built up the scenario.

创建者 AHMET D

Sep 3, 2021

I​t touches on real world cases and make attendants practice and help them how to read news about a a breach in any sources from the web. Thank you

创建者 Alberto G

Jul 6, 2021

Very nice and interesting course. Working in the IT it is a must have specialization.

For sure any kind of IT technicians should know.

创建者 Michael N

May 27, 2021

T​his is a really good test of understanding and complexities of real-world breaches. Not difficult but certainly not easy either.

创建者 Pablo A

Mar 23, 2021

I learned more real-world situations about the attack vectors and their consequences.

创建者 Daniel S

Oct 20, 2021

Ziemlich guter Kurs man lernt sehr viel davon, was auch dem Alltag als ITler hilft!

创建者 Rus M

Jun 9, 2021

Excellent presentation of the material, I learned a lot, as well as new approaches.