Informações sobre o curso

883,565 visualizações recentes
Certificados compartilháveis
Tenha o certificado após a conclusão
100% on-line
Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis
Redefinir os prazos de acordo com sua programação.
Nível iniciante
Aprox. 20 horas para completar
Inglês

O que você vai aprender

  • Discuss the evolution of security based on historical events.

  • List various types of malicious software.

  • Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.

  • Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.

Habilidades que você terá

Information Security (INFOSEC)IBM New CollarMalwareCybersecurityCyber Attacks
Certificados compartilháveis
Tenha o certificado após a conclusão
100% on-line
Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis
Redefinir os prazos de acordo com sua programação.
Nível iniciante
Aprox. 20 horas para completar
Inglês

Instrutores

oferecido por

Placeholder

IBM

Programa - O que você aprenderá com este curso

Classificação do conteúdoThumbs Up91%(23,752 classificações)Info
Semana
1

Semana 1

5 horas para concluir

History of Cybersecurity

5 horas para concluir
17 vídeos (Total 103 mín.), 9 leituras, 7 testes
17 videos
Welcome to History of Cybersecurity1min
Cybersecurity Definition3min
Key Terms1min
Security Threats2min
Vulnerability Assessments2min
Roles in Security4min
From Ronald Reagan/War Games to where we are Today4min
The Impact of 9/11 on Cybersecurity10min
Cybersecurity Today7min
Cybersecurity Introduction7min
Things to consider when starting a Cybersecurity program1min
What is Security?8min
Additional Security Challenges9min
Beyond Technology: Critical Thinking in Cybersecurity4min
Critical Thinking: A Model8min
Critical Thinking - 5 Key Skills16min
9 leituras
Earn an IBM digital badge5min
Your IBM Global Subject Matter Experts10min
The Insane Amounts of Data We're Using Every Minute (Infographic)10min
WiCys Organization Resources15min
The SANS Institute1min
OWASP - The Open Web Application Project1min
ISSA - Information Systems Security Association1min
FIRST- Forum of Incident Response and Security Teams10min
Additional Cybersecurity Industry Associations25min
7 exercícios práticos
Introduction to Cybersecurity Tools & Cyber Attacks30min
What are We Talking about when We Talk about Cybersecurity?20min
From Ronald Reagan to Where we are Today10min
Cybersecurity Programs10min
Cybersecurity - A Security Architect's Perspective15min
What is Critical Thinking?30min
History of Cybersecurity30min
Semana
2

Semana 2

6 horas para concluir

A brief overview of types of actors and their motives

6 horas para concluir
27 vídeos (Total 124 mín.), 2 leituras, 7 testes
27 videos
A brief overview of types of actors and their motives5min
Hacking organizations3min
Major different types of cyber attacks6min
Security Attack Definition7min
Security services11min
Security Mechanisms6min
Network Security Model8min
Organizational Threats6min
Attacks6min
Security Architecture Attacks3min
Security Architecture -Attack models8min
Malware and Ransomware3min
Threat Examples1min
Threat Protection Defined2min
Internet Security Threats - Mapping2min
Internet Security Threats - Packet Sniffing2min
Security Threat - IP Spoofing1min
Security Threats - Denial of service2min
Security Attacks - Host insertions3min
The Cyber Kill Chain5min
What is Social Engineering?4min
Social Engineering - Phishing and Vishing3min
Cyberwarfare6min
Cybercrime Resources4min
X-Force Command Center Introduction2min
Javier's perspective on Cybersecurity Skills1min
2 leituras
2019 Ponemon Institute Study on the Cyber Resilient Organization10min
X-Force Research20min
7 exercícios práticos
Types of Actors and their Motives30min
An Architect's perspective on attack classifications20min
Malware and an introduction to threat protection30min
Additional Attack examples today30min
Attacks and Cyber resources10min
A day in the life of a SOC analyst30min
A brief overview of types of actors and their motives50min
Semana
3

Semana 3

5 horas para concluir

An overview of key security concepts

5 horas para concluir
14 vídeos (Total 67 mín.), 4 leituras, 5 testes
14 videos
CIA Triad - Confidentiality2min
CIA Triad - Integrity6min
CIA Triad - Availability3min
Non - Repudiation - How does it apply to CIA?2min
Access Management4min
Incidence Response5min
Key Concepts - Incident Response7min
Incident Response Process7min
Introduction to Frameworks and Best Practices4min
IT Governance Process5min
Cybersecurity Compliance and Audit Overview7min
Pentest Process and Mile 2 CPTE Training5min
OWASP framework2min
4 leituras
OWASP Top 10 Project Findings 201715min
National Institute of Standards & Technology15min
National Initiative For Cybersecurity Education15min
Computer Security Incident Handling Guide20min
5 exercícios práticos
CIA Triad30min
Access Management30min
Incident Response30min
Frameworks and their purpose30min
Quiz: Key concepts35min
Semana
4

Semana 4

3 horas para concluir

An overview of key security tools

3 horas para concluir
16 vídeos (Total 68 mín.), 2 leituras, 5 testes
16 videos
Introduction to Firewalls2min
Firewalls - Packet Filtering2min
Firewalls - Application Gateway4min
Firewalls - XML Gateway2min
Firewalls - Stateless and Stateful3min
Antivirus/Antimalware1min
An introduction of Cryptography5min
Types of Cryptography5min
Cryptographic Attacks2min
Cryptography - a different perspective from a Security architect14min
Penetration Testing Introduction6min
Pentest Methodologies9min
Vulnerability Tests4min
What is Digital Forensics?4min
Conclusion24s
2 leituras
Securityintelligence.com25min
Incident Response and Digital Forensics: Will You Buy or Build?10min
5 exercícios práticos
Firewalls30min
Antivirus/Antimalware5min
Introduction to Cryptography12min
First look at Penetration Testing and Digital Forensics30min
Key security tools25min

Avaliações

Principais avaliações do INTRODUCTION TO CYBERSECURITY TOOLS & CYBER ATTACKS

Visualizar todas as avaliações

Perguntas Frequentes – FAQ

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.