This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field.
课程信息
学生职业成果
12%
25%
您将学到的内容有
Discuss the evolution of security based on historical events.
List various types of malicious software.
Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.
Identify key cybersecurity tools which include the following: firewall, anti-virus, cryptography, penetration testing and digital forensics.
您将获得的技能
学生职业成果
12%
25%
提供方

IBM
IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame.
教学大纲 - 您将从这门课程中学到什么
History of Cybersecurity
This module will give you a brief overview of the history of cybersecurity. You will also learn key terms and roles in cybersecurity.
A brief overview of types of actors and their motives
This module will provide you with a brief overview of types of actors and their motives. You will also understand different types of attacks and their impact on an organization and individuals. You will also learn about tools that are available to you to assist in any cybersecurity investigation.
An overview of key security concepts
This module will describe various key security concepts that are important in any cybersecurity position. The CIA Triad will be further explained. You will also begin to learn the significance of incident response and frameworks around cybersecurity. Finally, you will get an overview of IT Governance best practices and compliance.
An overview of key security tools
In this module, you will be introduced to key security tools including firewalls, anti-virus and cryptography. You will explore penetration testing and digital forensics. You will learn where you can get resources on industry and current threats to assist in further research around cybersecurity.
审阅
来自INTRODUCTION TO CYBERSECURITY TOOLS & CYBER ATTACKS的热门评论
The reading link to Week 03's Framework and their purpose is Broken. Please Fix it. Everything else seemed perfect. I would recommend this course for people who think of starting their careers in CyS.
It's a good introductory course that covers the main subjects of cybersecurity. I'd like to see some of the subjects in a more detailed explanation, because they were merely presented to the audience.
If you want to learn cybersecurity and you have no idea about that. Then this is the best course which covers all the basic topics and provide you a best knowledge about cybersecurity and their tools.
The quality for the material needs to be improved in terms of visualization and audio. The title is little bit misleading as i expect to be more insides to Cybersecurity tools like nmap nesus etc...
常见问题
我什么时候能够访问课程视频和作业?
我订阅此证书后会得到什么?
How can you claim your badge?
还有其他问题吗?请访问 学生帮助中心。