Chevron Left
返回到 Cybersecurity Capstone: Breach Response Case Studies

学生对 IBM 提供的 Cybersecurity Capstone: Breach Response Case Studies 的评价和反馈

4.8
354 个评分
66 条评论

课程概述

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization. Finally, you will explore the costs of data breaches through research studies and well known breaches. This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the seventh and final course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cybersecurity-breach-case-studies . In this course, you will learn to: ● Apply incident response methodologies. ● Research and describe a watering hole attack. ● Research and describe ransomware threats and the consequences to organization. ● Research and describe 3rd party breaches and how they affect an organization. ● Research and describe the effects of a phishing attack. ● Research and describe a point of sale attack and approximate cost of data breaches. ● Perform a case study on a current cyber attack and breach....

热门审阅

GM
Apr 26, 2021

Very good material. It is interesting to create a case study.\n\nIt was challenging to find enough material from open sources which can help you built up the scenario.

AD
Sep 2, 2021

It touches on real world cases and make attendants practice and help them how to read news about a a breach in any sources from the web. Thank you

筛选依据:

51 - Cybersecurity Capstone: Breach Response Case Studies 的 72 个评论(共 72 个)

创建者 Pratap J

Jul 9, 2020

amazing

创建者 Md. T U B

Jul 10, 2020

great

创建者 Tong V C

Jan 8, 2021

Good

创建者 MOHAMMED V S

Aug 22, 2020

good

创建者 Chathura S R

Jul 4, 2020

good

创建者 MD. A A M

Jun 13, 2020

Nice

创建者 T. A

Jul 28, 2020

A+

创建者 Monir S

Jul 29, 2021

创建者 João G

Apr 6, 2021

Very useful to know case studies and how its structured.

Some lessons are very boring.

I hope that's an instructor mistake that just read fast and made slides with many many lists and graphics that two days after, you absolutely forget it what you learned.

Because if it was not an instructor mistake, I don't even know if I'd like to study more in the future to make a career in cybersecurity.

创建者 Daniel R

Nov 8, 2020

Enjoyed this courses, the case studies are very informative. Point to admin, look into the peer to peer case study reviews, students have to wait too long for their project to be reviewed and still not getting a fair and honest one.

创建者 Takahide M

Aug 31, 2021

The story of computer viruses and cybersecurity reaffirmed the importance of teamwork and communication.

创建者 Kevin M M

Jul 11, 2020

Very interesting even if sometimes the lecture is more theoretical than practical

创建者 SANTOSO H

Dec 31, 2020

Really good stuff and strong foundation of cyber security.

创建者 Daniel O

Aug 30, 2021

In depth analysis of data breach. Very resourceful.

创建者 Mark S

Sep 14, 2021

The girl that just reads the information is awful.

创建者 Dicki D M

Jun 26, 2020

Goodd

创建者 David U

Aug 6, 2021

If you compare the delivery of the information in parts this course (eg someone reading from a book) to the penetration testing course where you see the guy talking to you. The penetration test course is much better. I really didn't like the delivery of information listening to someone reading from a book. In my opinion IBM can do much better. It really does make a difference in the learning experience. When someone is reading from a book the tone of voice is mostly equal and its harder to follow and retain information even though they have a pleasant sounding voice. Its much better to see someone talking to you as in the Penetration test course. I've taken quite a few IBM courses on here and the Pentest seems to be the best so far. I also took the Google IT specialist course and it was Excellent as for as delivery.

创建者 Svetoslav B

Aug 12, 2020

Great idea, but the assesment need, to be more user friendly.

创建者 Gnaore a C A

Feb 5, 2021

the court was enriching !!

创建者 Paul B

Nov 5, 2020

Peer review is annoying to wait for but everything else is decent.

创建者 Jonathan V C

Apr 16, 2021

This could be a part of another course, is like they run out of material and create a 4 week course justo to charge you more. 5 to 10 obvious questions for each 5 case studies, then the peer graded assignment that is just filling a powerpoint template, I work hard on that template, and people just upload random PDF's and two times they upload my own assignment, I report them but I think most of the people pass with just random content or plagiarizing. Peer graded assignments doesn't work anymore.

创建者 Donwald h

Jul 6, 2021

Im not able to finish this because there arent any assignments to peer review