À propos de ce cours
37,801 consultations récentes

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.

Niveau débutant

Approx. 13 heures pour terminer

Recommandé : 24 hours/week...

Anglais

Sous-titres : Anglais

Ce que vous allez apprendre

  • Check

    Understand network basics around the TCP/IP and OSI Models.

  • Check

    Recount DNS, DHCP, Switching and Routing concepts.

  • Check

    Understand IP Addressing, Network Address Translation and Packet Sniffing.

  • Check

    Describe the structures and vulnerabilities of key databases for cybersecurity including SQL, Couch, Oracle and MongoDB.

Compétences que vous acquerrez

database vulnerabilitiesNetwork SecuritySql InjectionCybersecuritynetworking basics

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.

Niveau débutant

Approx. 13 heures pour terminer

Recommandé : 24 hours/week...

Anglais

Sous-titres : Anglais

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1
3 heures pour terminer

TCP/IP Framework

16 vidéos (Total 71 min), 3 lectures, 4 quiz
16 vidéos
Welcome to Introduction to TCP/IP Framework34s
Stateless Inspection5 min
Stateful Inspection5 min
Firewall Filters- IDS and IPS Systems6 min
The Difference between IDS and IPS Systems2 min
Network Address Translation5 min
An Introduction to Local Area Networks6 min
Ethernet and LAN - Ethernet Operations5 min
Ethernet and LAN - Network Devices4 min
Introduction to Basic Network Routing1 min
Layer 2 and Layer 3 Network Addressing4 min
Address Resolution Protocol8 min
Routers and Routing Tables, Part 12 min
Routers and Routing Tables, Part 22 min
Routers and Routing Tables, Part 36 min
3 lectures
Earn an IBM digital badge10 min
About this course5 min
Research of Network Vendor Training20 min
4 exercices pour s'entraîner
Introduction to the TCP/IP Protocol Framework10 min
Network Protocols over Ethernet and Local Area Networks12 min
Basics of Routing and Switching, Network Packets and Structures12 min
TCP/IP Framework30 min
Semaine
2
2 heures pour terminer

Basics of IP Addressing and the OSI Model

16 vidéos (Total 71 min), 6 quiz
16 vidéos
IP Addressing - The Basics of Binary4 min
IP Address Structure and Network Classes4 min
IP Protocol and Traffic Routing6 min
Introduction to the IPv6 Address Schema3 min
Application and Transport Protocols UDP and TCP, Part 12 min
Application and Transport Protocols UDP and TCP, Part 26 min
DNS and DHCP4 min
Syslog Message Logging Protocol3 min
Flows and Network Analysis3 min
Port Mirroring and Promiscuous Mode2 min
Next Generation Firewalls - Overview4 min
NGFW and the OSI Model2 min
NGFW Packet Flow Example and NGFW Comparisons6 min
Intrusion Detection and Intrusion Prevention Systems5 min
High Availability and Clustering9 min
6 exercices pour s'entraîner
Basics of IP Addressing16 min
TCP/IP Layer 4, Transport Layer Overview6 min
TCP/IP Layer 5, Application Layer Overview12 min
Firewalls, Intrusion Detection and Intrusion Prevention Systems8 min
Clustering and High Availability Systems2 min
Basics of IP Addressing and the OSI Model30 min
Semaine
3
3 heures pour terminer

Introduction to Databases

18 vidéos (Total 88 min), 1 lecture, 4 quiz
18 vidéos
Data Source Types Part 15 min
Data Source Types Part 25 min
Data Model Types4 min
Structured Data7 min
Securing the Crown Jewels8 min
Leveraging Security Industry Best Practices1 min
Structured Data and Relational Databases1 min
Anatomy of a Vulnerability Assessment Test Report2 min
Securing Data Sources by Type8 min
Securing Databases Wrap Up2 min
Data Monitoring4 min
Data Alerts3 min
Data Activity Reporting8 min
Attributes to Include in Logging6 min
Failed Access Monitoring2 min
Suspicious Access Events, Part 14 min
Suspicious Access Events, Part 27 min
1 lecture
Data Breach Feeds25 min
4 exercices pour s'entraîner
Types of Data8 min
Securing Databases12 min
A Data Protection Solution Example, IBM Security Guadium Use Cases16 min
Introduction to Databases25 min
Semaine
4
2 heures pour terminer

Deep Dive - Injection Vulnerability

9 vidéos (Total 45 min), 1 lecture, 4 quiz
9 vidéos
Introduction to Injection Flaws3 min
OS Command Injection Part 18 min
OS Command Injection Part 25 min
OS Command Injection Part 37 min
SQL Injection Part 18 min
SQL Injection Part 26 min
Other Types of Injection4 min
Thank you for attending this course18s
1 lecture
Additional Resources35 min
4 exercices pour s'entraîner
Injection Vulnerability12 min
SQL Injection8 min
Deep Dive - Injection Vulnerability24 min
Opt-in to receive your badge!

Enseignant

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

À propos de IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

À propos du Spécialisation IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Foire Aux Questions

  • Une fois que vous êtes inscrit(e) pour un Certificat, vous pouvez accéder à toutes les vidéos de cours, et à tous les quiz et exercices de programmation (le cas échéant). Vous pouvez soumettre des devoirs à examiner par vos pairs et en examiner vous-même uniquement après le début de votre session. Si vous préférez explorer le cours sans l'acheter, vous ne serez peut-être pas en mesure d'accéder à certains devoirs.

  • Lorsque vous vous inscrivez au cours, vous bénéficiez d'un accès à tous les cours de la Spécialisation, et vous obtenez un Certificat lorsque vous avez réussi. Votre Certificat électronique est alors ajouté à votre page Accomplissements. À partir de cette page, vous pouvez imprimer votre Certificat ou l'ajouter à votre profil LinkedIn. Si vous souhaitez seulement lire et visualiser le contenu du cours, vous pouvez accéder gratuitement au cours en tant qu'auditeur libre.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.