Informações sobre o curso
29,349 visualizações recentes

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Aprox. 10 horas para completar

Sugerido: 17 hours/week...

Inglês

Legendas: Inglês

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Aprox. 10 horas para completar

Sugerido: 17 hours/week...

Inglês

Legendas: Inglês

Programa - O que você aprenderá com este curso

Semana
1
2 horas para concluir

People Process & Technology

9 vídeos (Total 48 mín.), 4 leituras, 4 testes
9 videos
Overview of People, Process and Technologies1min
What is IT Security?42s
Frameworks and their purpose4min
Roles in Security4min
Introduction to Process4min
Business Process Management Overview14min
Information Technology Infrastructure Library (ITIL) Overview9min
Key ITIL Processes6min
4 leituras
Earn an IBM digital badge5min
Your Subject Matter Experts10min
ITIL framework30min
What is IT Service Management?15min
4 exercícios práticos
Welcome to People, Process and Operating System Fundamentals for Cybersecurity4min
Frameworks, Policies and Roles4min
Business Process Management and IT Infrastructure Library Basics8min
People, Process and Technology20min
Semana
2
2 horas para concluir

Examples & Principles of the CIA Triad

5 vídeos (Total 16 mín.), 1 leitura, 2 testes
5 videos
Who are Alice, Bob and Trudy?3min
Confidentiality, Integrity and Availability9min
Authenticity and Accountability1min
Priscilla Mariel Guzman Angulo - What's important for my job.1min
1 leituras
Threat Horizon 2019: Disruption. Distortion. Deterioration1h
2 exercícios práticos
Further discussion of confidentiality, integrity and availability6min
Principles of the CIA Triad10min
1 hora para concluir

Authentication and Access Control

5 vídeos (Total 23 mín.), 1 leitura, 3 testes
5 videos
Identification and AAA7min
Access Control Methods3min
Access Control - Physical and Logical6min
Open Web Application Security Project (OWASP)3min
1 leituras
OWASP Top 10 Project20min
3 exercícios práticos
What is AAA?4min
Access Control4min
Authentication and Access control15min
Semana
3
1 hora para concluir

Windows Operating System Security Basics

6 vídeos (Total 28 mín.), 4 testes
6 videos
User and Kernel Mode4min
File Systems3min
Directory Structure6min
Shortcuts and Commands5min
Additional Shortcuts6min
4 exercícios práticos
User and Kernel Modes2min
File Systems and Directory Structure4min
Shortcuts and Commands4min
Windows Operating System Security Basics20min
1 hora para concluir

Linux Operating System Security Basics

4 vídeos (Total 21 mín.), 1 leitura, 4 testes
4 videos
File Systems6min
Basic Commands5min
Permissions and Owners6min
1 leituras
Pentestmonkey research20min
4 exercícios práticos
Key Components2min
File systems2min
Linux Basic Commands4min
Linux Operating System security basics20min
1 hora para concluir

macOS Security Basics

1 vídeo (Total 1 mín.), 1 leitura
1 vídeos
1 leituras
macOS Developer resources45min
Semana
4
1 hora para concluir

Overview of Virtualization

6 vídeos (Total 30 mín.), 2 leituras, 2 testes
6 videos
An Overview of Virtualization3min
Virtualization to Cloud4min
What is Cloud Computing?12min
Cloud Benefits, Security and Governance7min
Wrap up20s
2 leituras
SANS Institute research exercise3min
Differences between virtualization and cloud - RedHat20min
2 exercícios práticos
Virtualization Basics and Cloud Computing12min
Virtualization Basics15min
4.5
18 avaliaçõesChevron Right

Principais avaliações do Cybersecurity Roles, Processes & Operating System Security

por AMOct 28th 2019

Course material was very helpful. However, it would have been nice if the contents was cross referenced with the videos for language and comprehension.

por LSOct 9th 2019

At first i was hating this course design but now..its really great only what we need pay attention on videos and make notes.

Instrutores

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

Sobre IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

Sobre Programa de cursos integrados IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você se inscreve no curso, tem acesso a todos os cursos na Especialização e pode obter um certificado quando concluir o trabalho. Seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.