À propos de ce cours

445,659 consultations récentes
Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant
Approx. 10 heures pour terminer
Anglais
Sous-titres : Anglais
Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant
Approx. 10 heures pour terminer
Anglais
Sous-titres : Anglais

Offert par

Logo IBM

IBM

Programme du cours : ce que vous apprendrez dans ce cours

Évaluation du contenuThumbs Up92%(2,258 notes)Info
Semaine
1

Semaine 1

2 heures pour terminer

People Process & Technology

2 heures pour terminer
9 vidéos (Total 48 min), 4 lectures, 4 quiz
9 vidéos
Overview of People, Process and Technologies1 min
What is IT Security?42s
Frameworks and their purpose4 min
Roles in Security4 min
Introduction to Process4 min
Business Process Management Overview14 min
Information Technology Infrastructure Library (ITIL) Overview9 min
Key ITIL Processes6 min
4 lectures
Earn an IBM digital badge5 min
Your Subject Matter Experts10 min
ITIL framework30 min
What is IT Service Management?15 min
4 exercices pour s'entraîner
Welcome to People, Process and Operating System Fundamentals for Cybersecurity4 min
Frameworks, Policies and Roles4 min
Business Process Management and IT Infrastructure Library Basics8 min
People, Process and Technology20 min
Semaine
2

Semaine 2

2 heures pour terminer

Examples & Principles of the CIA Triad

2 heures pour terminer
5 vidéos (Total 16 min), 1 lecture, 2 quiz
5 vidéos
Who are Alice, Bob and Trudy?3 min
Confidentiality, Integrity and Availability9 min
Authenticity and Accountability1 min
Priscilla Mariel Guzman Angulo - What's important for my job.1 min
1 lecture
Threat Horizon 2019: Disruption. Distortion. Deterioration1 h
2 exercices pour s'entraîner
Further discussion of confidentiality, integrity and availability6 min
Principles of the CIA Triad10 min
1 heure pour terminer

Authentication and Access Control

1 heure pour terminer
5 vidéos (Total 23 min), 1 lecture, 3 quiz
5 vidéos
Identification and AAA7 min
Access Control Methods3 min
Access Control - Physical and Logical6 min
Open Web Application Security Project (OWASP)3 min
1 lecture
OWASP Top 10 Project20 min
3 exercices pour s'entraîner
What is AAA?4 min
Access Control4 min
Authentication and Access control15 min
Semaine
3

Semaine 3

1 heure pour terminer

Windows Operating System Security Basics

1 heure pour terminer
6 vidéos (Total 28 min)
6 vidéos
User and Kernel Mode4 min
File Systems3 min
Directory Structure6 min
Shortcuts and Commands5 min
Additional Shortcuts6 min
4 exercices pour s'entraîner
User and Kernel Modes2 min
File Systems and Directory Structure4 min
Shortcuts and Commands4 min
Windows Operating System Security Basics20 min
1 heure pour terminer

Linux Operating System Security Basics

1 heure pour terminer
4 vidéos (Total 21 min), 1 lecture, 4 quiz
4 vidéos
File Systems6 min
Basic Commands5 min
Permissions and Owners6 min
1 lecture
Pentestmonkey research20 min
4 exercices pour s'entraîner
Key Components2 min
File systems2 min
Linux Basic Commands4 min
Linux Operating System security basics20 min
1 heure pour terminer

macOS Security Basics

1 heure pour terminer
3 vidéos (Total 13 min), 1 lecture, 1 quiz
3 vidéos
macOS Security Settings4 min
macOS Recovery4 min
1 lecture
macOS Developer resources45 min
1 exercice pour s'entraîner
macOS Resources Knowledge Check6 min
Semaine
4

Semaine 4

2 heures pour terminer

Overview of Virtualization

2 heures pour terminer
6 vidéos (Total 30 min), 2 lectures, 2 quiz
6 vidéos
An Overview of Virtualization3 min
Virtualization to Cloud4 min
What is Cloud Computing?12 min
Cloud Benefits, Security and Governance7 min
Wrap up20s
2 lectures
SANS Institute research exercise20 min
Differences between virtualization and cloud - RedHat20 min
2 exercices pour s'entraîner
Virtualization Basics and Cloud Computing12 min
Virtualization Basics15 min

Avis

Meilleurs avis pour CYBERSECURITY ROLES, PROCESSES & OPERATING SYSTEM SECURITY

Voir tous les avis

Foire Aux Questions

  • Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:

    • The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.

    • The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.

  • When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.