Informações sobre o curso

38,188 visualizações recentes

Certificados compartilháveis

Tenha o certificado após a conclusão

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 10 horas para completar

Inglês

Legendas: Inglês

O que você vai aprender

  • Understand network basics around the TCP/IP and OSI Models.

  • Recount DNS, DHCP, Switching and Routing concepts.

  • Understand IP Addressing, Network Address Translation and Packet Sniffing.

  • Describe the structures and vulnerabilities of key databases for cybersecurity including SQL, Couch, Oracle and MongoDB.

Habilidades que você terá

database vulnerabilitiesNetwork SecuritySql InjectionCybersecuritynetworking basics

Certificados compartilháveis

Tenha o certificado após a conclusão

100% on-line

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 10 horas para completar

Inglês

Legendas: Inglês

oferecido por

Logotipo de IBM

IBM

Programa - O que você aprenderá com este curso

Semana
1

Semana 1

3 horas para concluir

TCP/IP Framework

3 horas para concluir
16 vídeos (Total 71 mín.), 3 leituras, 4 testes
16 videos
Welcome to Introduction to TCP/IP Framework34s
Stateless Inspection5min
Stateful Inspection5min
Firewall Filters- IDS and IPS Systems6min
The Difference between IDS and IPS Systems2min
Network Address Translation5min
An Introduction to Local Area Networks6min
Ethernet and LAN - Ethernet Operations5min
Ethernet and LAN - Network Devices4min
Introduction to Basic Network Routing1min
Layer 2 and Layer 3 Network Addressing4min
Address Resolution Protocol8min
Routers and Routing Tables, Part 12min
Routers and Routing Tables, Part 22min
Routers and Routing Tables, Part 36min
3 leituras
Earn an IBM digital badge10min
About this course5min
Research of Network Vendor Training20min
4 exercícios práticos
Introduction to the TCP/IP Protocol Framework10min
Network Protocols over Ethernet and Local Area Networks12min
Basics of Routing and Switching, Network Packets and Structures12min
TCP/IP Framework30min
Semana
2

Semana 2

2 horas para concluir

Basics of IP Addressing and the OSI Model

2 horas para concluir
16 vídeos (Total 71 mín.)
16 videos
IP Addressing - The Basics of Binary4min
IP Address Structure and Network Classes4min
IP Protocol and Traffic Routing6min
Introduction to the IPv6 Address Schema3min
Application and Transport Protocols UDP and TCP, Part 12min
Application and Transport Protocols UDP and TCP, Part 26min
DNS and DHCP4min
Syslog Message Logging Protocol3min
Flows and Network Analysis3min
Port Mirroring and Promiscuous Mode2min
Next Generation Firewalls - Overview4min
NGFW and the OSI Model2min
NGFW Packet Flow Example and NGFW Comparisons6min
Intrusion Detection and Intrusion Prevention Systems5min
High Availability and Clustering9min
6 exercícios práticos
Basics of IP Addressing16min
TCP/IP Layer 4, Transport Layer Overview6min
TCP/IP Layer 5, Application Layer Overview12min
Firewalls, Intrusion Detection and Intrusion Prevention Systems8min
Clustering and High Availability Systems2min
Basics of IP Addressing and the OSI Model30min
Semana
3

Semana 3

3 horas para concluir

Introduction to Databases

3 horas para concluir
18 vídeos (Total 88 mín.), 1 leitura, 4 testes
18 videos
Data Source Types Part 15min
Data Source Types Part 25min
Data Model Types4min
Structured Data7min
Securing the Crown Jewels8min
Leveraging Security Industry Best Practices1min
Structured Data and Relational Databases1min
Anatomy of a Vulnerability Assessment Test Report2min
Securing Data Sources by Type8min
Securing Databases Wrap Up2min
Data Monitoring4min
Data Alerts3min
Data Activity Reporting8min
Attributes to Include in Logging6min
Failed Access Monitoring2min
Suspicious Access Events, Part 14min
Suspicious Access Events, Part 27min
1 leituras
Data Breach Feeds25min
4 exercícios práticos
Types of Data8min
Securing Databases12min
A Data Protection Solution Example, IBM Security Guardium Use Cases16min
Introduction to Databases25min
Semana
4

Semana 4

2 horas para concluir

Deep Dive - Injection Vulnerability

2 horas para concluir
9 vídeos (Total 45 mín.), 1 leitura, 4 testes
9 videos
Introduction to Injection Flaws3min
OS Command Injection Part 18min
OS Command Injection Part 25min
OS Command Injection Part 37min
SQL Injection Part 18min
SQL Injection Part 26min
Other Types of Injection4min
Thank you for attending this course18s
1 leituras
Additional Resources35min
4 exercícios práticos
Injection Vulnerability12min
SQL Injection8min
Deep Dive - Injection Vulnerability24min
Opt-in to receive your badge!

Avaliações

Principais avaliações do NETWORK SECURITY & DATABASE VULNERABILITIES
Visualizar todas as avaliações

Sobre Programa de cursos integrados IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. The instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist Want to see if this is a good career fit for you? IBM is collaborating with MyInnerGenius to help you find out which careers in IT you will love -- careers that are a great match for you -- regardless of your education or experience -- even if you’ve never considered a role in IT....
IT Fundamentals for Cybersecurity

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você se inscreve no curso, tem acesso a todos os cursos na Especialização e pode obter um certificado quando concluir o trabalho. Seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.