À propos de ce cours
5,757 consultations récentes

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.

Approx. 17 heures pour terminer

Recommandé : 11 hours/week...

Anglais

Sous-titres : Anglais

Ce que vous allez apprendre

  • Check

    List and describe several key cybersecurity compliance and industry standards including NIST, GDPR, HIPAA, SANS and PCI.

  • Check

    Describe an overview of the design, roles and function of server and user administration.

  • Check

    Understand the concept of patching and endpoint protection as it relates to client system administration.

  • Check

    Define encryption, encoding, hashing and digital certificates as it relates to cryptography

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.

Approx. 17 heures pour terminer

Recommandé : 11 hours/week...

Anglais

Sous-titres : Anglais

Les étudiants prenant part à ce Course sont

  • Technical Support Associates
  • Software Engineers

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1
3 heures pour terminer

Compliance Frameworks and Industry Standards

13 vidéos (Total 61 min), 7 lectures, 5 quiz
13 vidéos
What will you learn in this module?1 min
What Cybersecurity Challenges do Organizations Face?7 min
Compliance Basics9 min
Overview of US Cybersecurity Federal Law2 min
National Institute of Standards and Technology (NIST) Overview1 min
General Data Protection Regulation (GDPR) Overview3 min
International Organization for Standardization (ISO) 2700x3 min
SOC Reports8 min
SOC Reports - Auditor Process Overview4 min
Health Insurance Portability and Accountability Act (HIPAA)7 min
Payment Card Industry Data Security Standard (PCI DSS)6 min
Center for Internet Security (CIS) Critical Security Controls4 min
7 lectures
Earn an IBM digital badge10 min
National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls25 min
Examples of Current GDPR Intention to Fine2 min
American Institute of CPAs (AICPA) Website research40 min
HIPAA Cybersecurity guidance1 min
Compliance and Industry Standards Summary10 min
Center for Internet Security (CIS) Critical Security Controls2 min
5 exercices pour s'entraîner
Compliance and Regulations for Cybersecurity8 min
System and Organization Controls Report (SOC) Overview2 min
Industry Standards6 min
CIS Critical Security Controls2 min
Compliance Frameworks and Industry Standards25 min
Semaine
2
3 heures pour terminer

Client System Administration, Endpoint Protection and Patching

7 vidéos (Total 38 min), 4 lectures, 3 quiz
7 vidéos
Client System Administration7 min
Endpoint Protection6 min
Endpoint Protection and Response4 min
Unified Endpoint Management8 min
Overview of Patching3 min
Windows Patching7 min
4 lectures
4 Social Engineering Threats to Keep an Eye on — and How to Stop Them20 min
Endpoint Protection - Additional Vendor Solutions10 min
Unified Endpoint for Dummies50 min
Patch Management Best Practices20 min
3 exercices pour s'entraîner
Client System Administration and Endpoint Protection4 min
Patching4 min
Client System Administration, Endpoint Protection and Patching15 min
Semaine
3
3 heures pour terminer

Server and User Administration

21 vidéos (Total 119 min), 3 lectures, 1 quiz
21 vidéos
User and Kernel Modes4 min
Files Systems3 min
Directory Structure6 min
Role-Based Access Control and Permissions6 min
Local User Accounts4 min
Windows 10 Security App3 min
Features of Active Directory5 min
Active Directory Accounts and Security Considerations13 min
Overview of Server Management with Windows Admin Center4 min
Kerberos Authentication and Logs7 min
Windows Auditing Overview6 min
Introduction to Linux2 min
Linux File Systems and Directory Structure4 min
Linux Run Levels2 min
Exploring the Shell2 min
Linux Internal and External Commands4 min
Linux Basic Commands- Part 110 min
Linux Basic Commands- Part 25 min
Linux Basic Commands Part 310 min
Demonstration of Samba Installation and Configuration5 min
3 lectures
Securing privileged access against Threats10 min
Beginning your General Data Protection Regulation (GDPR) Journey for Windows Server35 min
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide20 min
1 exercice pour s'entraîner
Windows Administration8 min
Semaine
4
2 heures pour terminer

Cryptography and Compliance Pitfalls

13 vidéos (Total 51 min), 5 lectures
13 vidéos
Cryptography- An Introduction3 min
Cryptography- the Basics7 min
Common Cryptography Pitfalls12 min
Encrypting Data at Rest2 min
Encrypting Data in Use1 min
Encrypting Data in Transit7 min
Hashing7 min
Digital Signatures1 min
Safeguarding Encryption Keys2 min
Impact of Quantum Computing2 min
Key Takeaways - Cryptography and Encryption1 min
Thank you4s
5 lectures
Additional Review of Cryptographic exposures20 min
Digital Signature reading - National Institute of Standards and Technology (NIST)20 min
Additional Quantum Computing Research25 min
Cryptographic Weaknesses - SANS Top 2520 min
Additional Cryptography and Encryption Examples1 min

Enseignant

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

À propos de IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

À propos du Spécialisation IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Foire Aux Questions

  • Une fois que vous êtes inscrit(e) pour un Certificat, vous pouvez accéder à toutes les vidéos de cours, et à tous les quiz et exercices de programmation (le cas échéant). Vous pouvez soumettre des devoirs à examiner par vos pairs et en examiner vous-même uniquement après le début de votre session. Si vous préférez explorer le cours sans l'acheter, vous ne serez peut-être pas en mesure d'accéder à certains devoirs.

  • Lorsque vous vous inscrivez au cours, vous bénéficiez d'un accès à tous les cours de la Spécialisation, et vous obtenez un Certificat lorsque vous avez réussi. Votre Certificat électronique est alors ajouté à votre page Accomplissements. À partir de cette page, vous pouvez imprimer votre Certificat ou l'ajouter à votre profil LinkedIn. Si vous souhaitez seulement lire et visualiser le contenu du cours, vous pouvez accéder gratuitement au cours en tant qu'auditeur libre.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.