Build key skills needed to recognize common security threats and risks. Discover the characteristics of cyber-attacks and learn how organizations employ best practices to guard against them.
Offert par


À propos de ce cours
Basic computer operating skills, including using a web browser.
Ce que vous allez apprendre
Recognize the importance of data security, maintaining data integrity,and confidentiality
Demonstrate the installation of software updates and patches
Identify preferred practices for authentication, encryption, and device security
Discuss types of security threats, breaches, malware, social engineering, and other attack vectors
Compétences que vous acquerrez
- Information Security (INFOSEC)
- Cyberattacks
- Application Security
- Cryptography
- security
Basic computer operating skills, including using a web browser.
Offert par

IBM
IBM is the global leader in business transformation through an open hybrid cloud platform and AI, serving clients in more than 170 countries around the world. Today 47 of the Fortune 50 Companies rely on the IBM Cloud to run their business, and IBM Watson enterprise AI is hard at work in more than 30,000 engagements. IBM is also one of the world’s most vital corporate research organizations, with 28 consecutive years of patent leadership. Above all, guided by principles for trust and transparency and support for a more inclusive society, IBM is committed to being a responsible technology innovator and a force for good in the world.
Programme de cours : ce que vous apprendrez dans ce cours
Common Security Threats and Risks
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks typically include business interruptions or the theft, tampering, or destruction of sensitive information. Ransomware attacks are on the rise and are predicted to cost victims more than $265 billion (USD) annually by 2031. And that is just one type of threat we all need to protect against. The need for organizations to implement effective security practices has never been more important or urgent. This module will teach you the skills you need to identify basic security threats and choose the best security practices to address those threats.
Security Best Practices
Unfortunately, there’s no single solution for effective cybersecurity. The best practice is to use multiple layers of security. Some great first steps you can take to improve security and build a solid foundation to protect against cyberattacks are to use strong passwords, good password management, and multi-factor authentication. You should also limit access to data and resources to only those people who need them. Your security plan can be further rounded out and strengthened by using techniques such as device hardening, and encryption, and by educating employees about cyberthreats as a regular part of their training. This week, you’ll learn more about security, including password management, creating effective passwords, and securing devices. You’ll learn the differences between authentication, authorization, and accounting, and how these concepts help secure devices and validate logons. You’ll also learn how encryption can help secure data transmissions and how to manage email and spam.
Safe Browsing Practices
From people, to computers, to mobile phones, and the Internet of Things, everything is connected. Today there are more devices than people. For some, mobile phones and tablets have replaced traditional desktop computers and laptops. The web is where people and businesses get things done and it’s always on, 24 hours a day.
Final Quiz
In this module, you’ll assess your course knowledge through a final quiz based on the previous four modules.
Foire Aux Questions
Quand aurai-je accès aux vidéos de cours et aux devoirs ?
À quoi ai-je droit si je m'abonne à ce Certificat ?
D'autres questions ? Visitez le Centre d'Aide pour les Étudiants.