课程信息

849,481 次近期查看

学生职业成果

33%

通过此课程获得实实在在的工作福利

50%

加薪或升职
可分享的证书
完成后获得证书
100% 在线
立即开始,按照自己的计划学习。
可灵活调整截止日期
根据您的日程表重置截止日期。
初级
完成时间大约为20 小时
英语(English)

您将学到的内容有

  • Discuss the evolution of security based on historical events.

  • List various types of malicious software.

  • Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.

  • Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.

您将获得的技能

Information Security (INFOSEC)IBM New CollarMalwareCybersecurityCyber Attacks

学生职业成果

33%

通过此课程获得实实在在的工作福利

50%

加薪或升职
可分享的证书
完成后获得证书
100% 在线
立即开始,按照自己的计划学习。
可灵活调整截止日期
根据您的日程表重置截止日期。
初级
完成时间大约为20 小时
英语(English)

提供方

Placeholder

IBM

教学大纲 - 您将从这门课程中学到什么

内容评分Thumbs Up91%(23,969 个评分)Info
1

1

完成时间为 5 小时

History of Cybersecurity

完成时间为 5 小时
17 个视频 (总计 103 分钟), 9 个阅读材料, 7 个测验
17 个视频
Welcome to History of Cybersecurity1分钟
Cybersecurity Definition3分钟
Key Terms1分钟
Security Threats2分钟
Vulnerability Assessments2分钟
Roles in Security4分钟
From Ronald Reagan/War Games to where we are Today4分钟
The Impact of 9/11 on Cybersecurity10分钟
Cybersecurity Today7分钟
Cybersecurity Introduction7分钟
Things to consider when starting a Cybersecurity program1分钟
What is Security?8分钟
Additional Security Challenges9分钟
Beyond Technology: Critical Thinking in Cybersecurity4分钟
Critical Thinking: A Model8分钟
Critical Thinking - 5 Key Skills16分钟
9 个阅读材料
Earn an IBM digital badge5分钟
Your IBM Global Subject Matter Experts10分钟
The Insane Amounts of Data We're Using Every Minute (Infographic)10分钟
WiCys Organization Resources15分钟
The SANS Institute1分钟
OWASP - The Open Web Application Project1分钟
ISSA - Information Systems Security Association1分钟
FIRST- Forum of Incident Response and Security Teams10分钟
Additional Cybersecurity Industry Associations25分钟
7 个练习
Introduction to Cybersecurity Tools & Cyber Attacks30分钟
What are We Talking about when We Talk about Cybersecurity?20分钟
From Ronald Reagan to Where we are Today10分钟
Cybersecurity Programs10分钟
Cybersecurity - A Security Architect's Perspective15分钟
What is Critical Thinking?30分钟
History of Cybersecurity30分钟
2

2

完成时间为 6 小时

A brief overview of types of actors and their motives

完成时间为 6 小时
27 个视频 (总计 124 分钟), 2 个阅读材料, 7 个测验
27 个视频
A brief overview of types of actors and their motives5分钟
Hacking organizations3分钟
Major different types of cyber attacks6分钟
Security Attack Definition7分钟
Security services11分钟
Security Mechanisms6分钟
Network Security Model8分钟
Organizational Threats6分钟
Attacks6分钟
Security Architecture Attacks3分钟
Security Architecture -Attack models8分钟
Malware and Ransomware3分钟
Threat Examples1分钟
Threat Protection Defined2分钟
Internet Security Threats - Mapping2分钟
Internet Security Threats - Packet Sniffing2分钟
Security Threat - IP Spoofing1分钟
Security Threats - Denial of service2分钟
Security Attacks - Host insertions3分钟
The Cyber Kill Chain5分钟
What is Social Engineering?4分钟
Social Engineering - Phishing and Vishing3分钟
Cyberwarfare6分钟
Cybercrime Resources4分钟
X-Force Command Center Introduction2分钟
Javier's perspective on Cybersecurity Skills1分钟
2 个阅读材料
2019 Ponemon Institute Study on the Cyber Resilient Organization10分钟
X-Force Research20分钟
7 个练习
Types of Actors and their Motives30分钟
An Architect's perspective on attack classifications20分钟
Malware and an introduction to threat protection30分钟
Additional Attack examples today30分钟
Attacks and Cyber resources10分钟
A day in the life of a SOC analyst30分钟
A brief overview of types of actors and their motives50分钟
3

3

完成时间为 5 小时

An overview of key security concepts

完成时间为 5 小时
14 个视频 (总计 67 分钟), 4 个阅读材料, 5 个测验
14 个视频
CIA Triad - Confidentiality2分钟
CIA Triad - Integrity6分钟
CIA Triad - Availability3分钟
Non - Repudiation - How does it apply to CIA?2分钟
Access Management4分钟
Incidence Response5分钟
Key Concepts - Incident Response7分钟
Incident Response Process7分钟
Introduction to Frameworks and Best Practices4分钟
IT Governance Process5分钟
Cybersecurity Compliance and Audit Overview7分钟
Pentest Process and Mile 2 CPTE Training5分钟
OWASP framework2分钟
4 个阅读材料
OWASP Top 10 Project Findings 201715分钟
National Institute of Standards & Technology15分钟
National Initiative For Cybersecurity Education15分钟
Computer Security Incident Handling Guide20分钟
5 个练习
CIA Triad30分钟
Access Management30分钟
Incident Response30分钟
Frameworks and their purpose30分钟
Quiz: Key concepts35分钟
4

4

完成时间为 3 小时

An overview of key security tools

完成时间为 3 小时
16 个视频 (总计 68 分钟), 2 个阅读材料, 5 个测验
16 个视频
Introduction to Firewalls2分钟
Firewalls - Packet Filtering2分钟
Firewalls - Application Gateway4分钟
Firewalls - XML Gateway2分钟
Firewalls - Stateless and Stateful3分钟
Antivirus/Antimalware1分钟
An introduction of Cryptography5分钟
Types of Cryptography5分钟
Cryptographic Attacks2分钟
Cryptography - a different perspective from a Security architect14分钟
Penetration Testing Introduction6分钟
Pentest Methodologies9分钟
Vulnerability Tests4分钟
What is Digital Forensics?4分钟
Conclusion24
2 个阅读材料
Securityintelligence.com25分钟
Incident Response and Digital Forensics: Will You Buy or Build?10分钟
5 个练习
Firewalls30分钟
Antivirus/Antimalware5分钟
Introduction to Cryptography12分钟
First look at Penetration Testing and Digital Forensics30分钟
Key security tools25分钟

审阅

来自INTRODUCTION TO CYBERSECURITY TOOLS & CYBER ATTACKS的热门评论

查看所有评论

常见问题

还有其他问题吗?请访问 学生帮助中心