Informações sobre o curso

26,188 visualizações recentes

Certificados compartilháveis

Tenha o certificado após a conclusão

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Aprox. 11 horas para completar

Sugerido: 17 hours/week...

Inglês

Legendas: Inglês

O que você vai aprender

  • List and describe several key cybersecurity compliance and industry standards including NIST, GDPR, HIPAA, SANS and PCI.

  • Describe an overview of the design, roles and function of server and user administration.

  • Understand the concept of patching and endpoint protection as it relates to client system administration.

  • Define encryption, encoding, hashing and digital certificates as it relates to cryptography

Certificados compartilháveis

Tenha o certificado após a conclusão

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Aprox. 11 horas para completar

Sugerido: 17 hours/week...

Inglês

Legendas: Inglês

oferecido por

Logotipo de IBM

IBM

Programa - O que você aprenderá com este curso

Semana
1

Semana 1

4 horas para concluir

Compliance Frameworks and Industry Standards

4 horas para concluir
13 vídeos (Total 61 mín.), 8 leituras, 5 testes
13 videos
What will you learn in this module?1min
What Cybersecurity Challenges do Organizations Face?7min
Compliance Basics9min
Overview of US Cybersecurity Federal Law2min
National Institute of Standards and Technology (NIST) Overview1min
General Data Protection Regulation (GDPR) Overview3min
International Organization for Standardization (ISO) 2700x3min
SOC Reports8min
SOC Reports - Auditor Process Overview4min
Health Insurance Portability and Accountability Act (HIPAA)7min
Payment Card Industry Data Security Standard (PCI DSS)6min
Center for Internet Security (CIS) Critical Security Controls4min
8 leituras
Earn an IBM digital badge10min
About this course5min
National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls25min
Examples of Current GDPR Intention to Fine15min
American Institute of CPAs (AICPA) Website research40min
HIPAA Cybersecurity guidance15min
Compliance and Industry Standards Summary10min
Center for Internet Security (CIS) Critical Security Controls10min
5 exercícios práticos
Compliance and Regulations for Cybersecurity8min
System and Organization Controls Report (SOC) Overview2min
Industry Standards6min
CIS Critical Security Controls2min
Compliance Frameworks and Industry Standards25min
Semana
2

Semana 2

3 horas para concluir

Client System Administration, Endpoint Protection and Patching

3 horas para concluir
7 vídeos (Total 38 mín.), 4 leituras, 3 testes
7 videos
Client System Administration7min
Endpoint Protection6min
Endpoint Protection and Response4min
Unified Endpoint Management8min
Overview of Patching3min
Windows Patching7min
4 leituras
4 Social Engineering Threats to Keep an Eye on — and How to Stop Them20min
Endpoint Protection - Additional Vendor Solutions10min
Unified Endpoint for Dummies50min
Patch Management Best Practices20min
3 exercícios práticos
Client System Administration and Endpoint Protection4min
Patching4min
Client System Administration, Endpoint Protection and Patching15min
Semana
3

Semana 3

4 horas para concluir

Server and User Administration

4 horas para concluir
21 vídeos (Total 119 mín.), 3 leituras, 3 testes
21 videos
User and Kernel Modes4min
Files Systems3min
Directory Structure6min
Role-Based Access Control and Permissions6min
Local User Accounts4min
Windows 10 Security App3min
Features of Active Directory5min
Active Directory Accounts and Security Considerations13min
Overview of Server Management with Windows Admin Center4min
Kerberos Authentication and Logs7min
Windows Auditing Overview6min
Introduction to Linux2min
Linux File Systems and Directory Structure4min
Linux Run Levels2min
Exploring the Shell2min
Linux Internal and External Commands4min
Linux Basic Commands- Part 110min
Linux Basic Commands- Part 25min
Linux Basic Commands Part 310min
Demonstration of Samba Installation and Configuration5min
3 leituras
Securing privileged access against Threats10min
Beginning your General Data Protection Regulation (GDPR) Journey for Windows Server35min
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide20min
3 exercícios práticos
Windows Administration8min
Linux Basics4min
Server and User Administration20min
Semana
4

Semana 4

3 horas para concluir

Cryptography and Compliance Pitfalls

3 horas para concluir
13 vídeos (Total 51 mín.), 5 leituras, 2 testes
13 videos
Cryptography- An Introduction3min
Cryptography- the Basics7min
Common Cryptography Pitfalls12min
Encrypting Data at Rest2min
Encrypting Data in Use1min
Encrypting Data in Transit7min
Hashing7min
Digital Signatures1min
Safeguarding Encryption Keys2min
Impact of Quantum Computing2min
Key Takeaways - Cryptography and Encryption1min
Thank you4s
5 leituras
Additional Review of Cryptographic exposures20min
Digital Signature reading - National Institute of Standards and Technology (NIST)20min
Additional Quantum Computing Research25min
Cryptographic Weaknesses - SANS Top 2520min
Additional Cryptography and Encryption Examples10min
2 exercícios práticos
Cryptography Basics8min
Cryptography and Compliance Pitfalls15min

Avaliações

Principais avaliações do CYBERSECURITY COMPLIANCE FRAMEWORK & SYSTEM ADMINISTRATION
Visualizar todas as avaliações

Sobre Programa de cursos integrados IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. The instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist Want to see if this is a good career fit for you? IBM is collaborating with MyInnerGenius to help you find out which careers in IT you will love -- careers that are a great match for you -- regardless of your education or experience -- even if you’ve never considered a role in IT....
IT Fundamentals for Cybersecurity

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você se inscreve no curso, tem acesso a todos os cursos na Especialização e pode obter um certificado quando concluir o trabalho. Seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.