课程信息

1,450,191 次近期查看
可分享的证书
完成后获得证书
100% 在线
立即开始,按照自己的计划学习。
可灵活调整截止日期
根据您的日程表重置截止日期。
初级
完成时间大约为20 小时
英语(English)
字幕:英语(English)

您将学到的内容有

  • Discuss the evolution of security based on historical events.

  • List various types of malicious software.

  • Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.

  • Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.

您将获得的技能

Information Security (INFOSEC)IBM New CollarMalwareCybersecurityCyber Attacks
可分享的证书
完成后获得证书
100% 在线
立即开始,按照自己的计划学习。
可灵活调整截止日期
根据您的日程表重置截止日期。
初级
完成时间大约为20 小时
英语(English)
字幕:英语(English)

提供方

IBM 徽标

IBM

教学大纲 - 您将从这门课程中学到什么

内容评分Thumbs Up90%(16,379 个评分)Info
1

1

完成时间为 5 小时

History of Cybersecurity

完成时间为 5 小时
17 个视频 (总计 103 分钟), 9 个阅读材料, 7 个测验
17 个视频
Welcome to History of Cybersecurity1分钟
Cybersecurity Definition3分钟
Key Terms1分钟
Security Threats2分钟
Vulnerability Assessments2分钟
Roles in Security4分钟
From Ronald Reagan/War Games to where we are Today4分钟
The Impact of 9/11 on Cybersecurity10分钟
Cybersecurity Today7分钟
Cybersecurity Introduction7分钟
Things to consider when starting a Cybersecurity program1分钟
What is Security?8分钟
Additional Security Challenges9分钟
Beyond Technology: Critical Thinking in Cybersecurity4分钟
Critical Thinking: A Model8分钟
Critical Thinking - 5 Key Skills16分钟
9 个阅读材料
Earn an IBM digital badge5分钟
Your IBM Global Subject Matter Experts10分钟
The Insane Amounts of Data We're Using Every Minute (Infographic)10分钟
WiCys Organization Resources15分钟
The SANS Institute1分钟
OWASP - The Open Web Application Project1分钟
ISSA - Information Systems Security Association1分钟
FIRST- Forum of Incident Response and Security Teams10分钟
Additional Cybersecurity Industry Associations25分钟
7 个练习
Introduction to Cybersecurity Tools & Cyber Attacks30分钟
What are We Talking about when We Talk about Cybersecurity?20分钟
From Ronald Reagan to Where we are Today10分钟
Cybersecurity Programs10分钟
Cybersecurity - A Security Architect's Perspective15分钟
What is Critical Thinking?30分钟
History of Cybersecurity30分钟
2

2

完成时间为 6 小时

A brief overview of types of actors and their motives

完成时间为 6 小时
27 个视频 (总计 124 分钟), 2 个阅读材料, 7 个测验
27 个视频
A brief overview of types of actors and their motives5分钟
Hacking organizations3分钟
Major different types of cyber attacks6分钟
Security Attack Definition7分钟
Security services11分钟
Security Mechanisms6分钟
Network Security Model8分钟
Organizational Threats6分钟
Attacks6分钟
Security Architecture Attacks3分钟
Security Architecture -Attack models8分钟
Malware and Ransomware3分钟
Threat Examples1分钟
Threat Protection Defined2分钟
Internet Security Threats - Mapping2分钟
Internet Security Threats - Packet Sniffing2分钟
Security Threat - IP Spoofing1分钟
Security Threats - Denial of service2分钟
Security Attacks - Host insertions3分钟
The Cyber Kill Chain5分钟
What is Social Engineering?4分钟
Social Engineering - Phishing and Vishing3分钟
Cyberwarfare6分钟
Cybercrime Resources4分钟
X-Force Command Center Introduction2分钟
Javier's perspective on Cybersecurity Skills1分钟
2 个阅读材料
2019 Ponemon Institute Study on the Cyber Resilient Organization10分钟
X-Force Research20分钟
7 个练习
Types of Actors and their Motives30分钟
An Architect's perspective on attack classifications20分钟
Malware and an introduction to threat protection30分钟
Additional Attack examples today30分钟
Attacks and Cyber resources10分钟
A day in the life of a SOC analyst30分钟
A brief overview of types of actors and their motives50分钟
3

3

完成时间为 5 小时

An overview of key security concepts

完成时间为 5 小时
14 个视频 (总计 67 分钟), 4 个阅读材料, 5 个测验
14 个视频
CIA Triad - Confidentiality2分钟
CIA Triad - Integrity6分钟
CIA Triad - Availability3分钟
Non - Repudiation - How does it apply to CIA?2分钟
Access Management4分钟
Incidence Response5分钟
Key Concepts - Incident Response7分钟
Incident Response Process7分钟
Introduction to Frameworks and Best Practices4分钟
IT Governance Process5分钟
Cybersecurity Compliance and Audit Overview7分钟
Pentest Process and Mile 2 CPTE Training5分钟
OWASP framework2分钟
4 个阅读材料
OWASP Top 10 Project Findings 201715分钟
National Institute of Standards & Technology15分钟
National Initiative For Cybersecurity Education15分钟
Computer Security Incident Handling Guide20分钟
5 个练习
CIA Triad30分钟
Access Management30分钟
Incident Response30分钟
Frameworks and their purpose30分钟
Quiz: Key concepts35分钟
4

4

完成时间为 3 小时

An overview of key security tools

完成时间为 3 小时
16 个视频 (总计 68 分钟), 2 个阅读材料, 5 个测验
16 个视频
Introduction to Firewalls2分钟
Firewalls - Packet Filtering2分钟
Firewalls - Application Gateway4分钟
Firewalls - XML Gateway2分钟
Firewalls - Stateless and Stateful3分钟
Antivirus/Antimalware1分钟
An introduction of Cryptography5分钟
Types of Cryptography5分钟
Cryptographic Attacks2分钟
Cryptography - a different perspective from a Security architect14分钟
Penetration Testing Introduction6分钟
Pentest Methodologies9分钟
Vulnerability Tests4分钟
What is Digital Forensics?4分钟
Conclusion24
2 个阅读材料
Securityintelligence.com25分钟
Incident Response and Digital Forensics: Will You Buy or Build?10分钟
5 个练习
Firewalls30分钟
Antivirus/Antimalware5分钟
Introduction to Cryptography12分钟
First look at Penetration Testing and Digital Forensics30分钟
Key security tools25分钟

审阅

来自INTRODUCTION TO CYBERSECURITY TOOLS & CYBER ATTACKS的热门评论

查看所有评论

常见问题

  • 讲座和作业的访问权限取决于您的注册类型。如果您以旁听模式参加课程,则可以免费查看大多数课程资料。要访问评分作业并获得证书,您需要在旁听期间或之后购买证书体验。如果看不到旁听选项:

    • 课程可能不提供旁听选项。您可以尝试免费试用,也可以申请助学金。
    • 课程可能会改为提供'完整课程,没有证书'。通过此选项,您可以查看所有课程材料、提交所要求的作业,以及获得最终成绩。这也意味着您将无法购买证书体验。
  • 您注册课程后,将有权访问证书中的所有课程,并且会在完成作业后获得证书。您的电子证书将添加到您的成就页中,您可以通过该页打印证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

  • 如果订阅,您可以获得 7 天免费试听,在此期间,您可以取消课程,无需支付任何罚金。在此之后,我们不会退款,但您可以随时取消订阅。请阅读我们完整的退款政策

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

还有其他问题吗?请访问 学生帮助中心