课程信息
100,746 次近期查看

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

初级

完成时间大约为20 小时

建议:17 hours/week...

英语(English)

字幕:英语(English)

您将学到的内容有

  • Check

    Discuss the evolution of security based on historical events.

  • Check

    List various types of malicious software.

  • Check

    Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.

  • Check

    Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.

您将获得的技能

Information Security (INFOSEC)IBM New CollarMalwareCybersecurityCyber Attacks

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

初级

完成时间大约为20 小时

建议:17 hours/week...

英语(English)

字幕:英语(English)

教学大纲 - 您将从这门课程中学到什么

1
完成时间为 5 小时

History of Cybersecurity

17 个视频 (总计 103 分钟), 9 个阅读材料, 7 个测验
17 个视频
Welcome to History of Cybersecurity1分钟
Cybersecurity Definition3分钟
Key Terms1分钟
Security Threats2分钟
Vulnerability Assessments2分钟
Roles in Security4分钟
From Ronald Reagan/War Games to where we are Today4分钟
The Impact of 9/11 on Cybersecurity10分钟
Cybersecurity Today7分钟
Cybersecurity Introduction7分钟
Things to consider when starting a Cybersecurity program1分钟
What is Security?8分钟
Additional Security Challenges9分钟
Beyond Technology: Critical Thinking in Cybersecurity4分钟
Critical Thinking: A Model8分钟
Critical Thinking - 5 Key Skills16分钟
9 个阅读材料
Earn an IBM digital badge5分钟
Your IBM Global Subject Matter Experts10分钟
The Insane Amounts of Data We're Using Every Minute (Infographic)10分钟
WiCys Organization Resources15分钟
The SANS Institute1分钟
OWASP - The Open Web Application Project1分钟
ISSA - Information Systems Security Association1分钟
FIRST- Forum of Incident Response and Security Teams10分钟
Additional Cybersecurity Industry Associations25分钟
7 个练习
Introduction to Cybersecurity Tools & Cyber Attacks4分钟
What are We Talking about when We Talk about Cybersecurity?20分钟
From Ronald Reagan to Where we are Today10分钟
Cybersecurity Programs10分钟
Cybersecurity - A Security Architect's Perspective15分钟
What is Critical Thinking?6分钟
History of Cybersecurity30分钟
2
完成时间为 4 小时

A brief overview of types of actors and their motives

27 个视频 (总计 124 分钟), 2 个阅读材料, 7 个测验
27 个视频
A brief overview of types of actors and their motives5分钟
Hacking organizations3分钟
Major different types of cyber attacks6分钟
Security Attack Definition7分钟
Security services11分钟
Security Mechanisms6分钟
Network Security Model8分钟
Organizational Threats6分钟
Attacks6分钟
Security Architecture Attacks3分钟
Security Architecture -Attack models8分钟
Malware and Ransomware3分钟
Threat Examples1分钟
Threat Protection Defined2分钟
Internet Security Threats - Mapping2分钟
Internet Security Threats - Packet Sniffing2分钟
Security Threat - IP Spoofing1分钟
Security Threats - Denial of service2分钟
Security Attacks - Host insertions3分钟
The Cyber Kill Chain5分钟
What is Social Engineering?4分钟
Social Engineering - Phishing and Vishing3分钟
Cyberwarfare6分钟
Cybercrime Resources4分钟
X-Force Command Center Introduction2分钟
Javier's perspective on Cybersecurity Skills1分钟
2 个阅读材料
2019 Ponemon Institute Study on the Cyber Resilient Organization10分钟
X-Force Research20分钟
7 个练习
Types of Actors and their Motives10分钟
An Architect's perspective on attack classifications20分钟
Malware and an introduction to threat protection10分钟
Additional Attack examples today10分钟
Attacks and Cyber resources10分钟
A day in the life of a SOC analyst2分钟
A brief overview of types of actors and their motives50分钟
3
完成时间为 3 小时

An overview of key security concepts

14 个视频 (总计 67 分钟), 4 个阅读材料, 5 个测验
14 个视频
CIA Triad - Confidentiality2分钟
CIA Triad - Integrity6分钟
CIA Triad - Availability3分钟
Non - Repudiation - How does it apply to CIA?2分钟
Access Management4分钟
Incidence Response5分钟
Key Concepts - Incident Response7分钟
Incident Response Process7分钟
Introduction to Frameworks and Best Practices4分钟
IT Governance Process5分钟
Cybersecurity Compliance and Audit Overview7分钟
Pentest Process and Mile 2 CPTE Training5分钟
OWASP framework2分钟
4 个阅读材料
OWASP Top 10 Project Findings 201715分钟
National Institute of Standards & Technology15分钟
National Initiative For Cybersecurity Education15分钟
Computer Security Incident Handling Guide20分钟
5 个练习
CIA Triad8分钟
Access Management2分钟
Incident Response6分钟
Frameworks and their purpose10分钟
Quiz: Key concepts35分钟
4
完成时间为 3 小时

An overview of key security tools

16 个视频 (总计 68 分钟), 2 个阅读材料, 5 个测验
16 个视频
Introduction to Firewalls2分钟
Firewalls - Packet Filtering2分钟
Firewalls - Application Gateway4分钟
Firewalls - XML Gateway2分钟
Firewalls - Stateless and Stateful3分钟
Antivirus/Antimalware1分钟
An introduction of Cryptography5分钟
Types of Cryptography5分钟
Cryptographic Attacks2分钟
Cryptography - a different perspective from a Security architect14分钟
Penetration Testing Introduction6分钟
Pentest Methodologies9分钟
Vulnerability Tests4分钟
What is Digital Forensics?4分钟
Conclusion24
2 个阅读材料
Securityintelligence.com25分钟
Incident Response and Digital Forensics: Will You Buy or Build?10分钟
5 个练习
Firewalls10分钟
Antivirus/Antimalware5分钟
Introduction to Cryptography12分钟
First look at Penetration Testing and Digital Forensics8分钟
Key security tools25分钟
4.5
66 条评论Chevron Right

来自Introduction to Cybersecurity Tools & Cyber Attacks的热门评论

创建者 SZNov 7th 2019

I appreciate the chance to learn fundamentals of cyber security with you.\n\nThe vast number of topics made it pretty interesting for me and I couldn't wait to learn more.\n\nSincerely, Sadra Zargar

创建者 LSOct 7th 2019

course is good but the problem occurs because of asginment, because there is many right answer in option so student get confuse and sometimes wrong answers are right.

讲师

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

关于 IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

关于 IT Fundamentals for Cybersecurity 专项课程

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

常见问题

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

还有其他问题吗?请访问 学生帮助中心