Über diesen Kurs
25,654 kürzliche Aufrufe

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Ca. 12 Stunden zum Abschließen

Empfohlen: 17 hours/week...

Englisch

Untertitel: Englisch

Was Sie lernen werden

  • Check

    List and describe several key cybersecurity compliance and industry standards including NIST, GDPR, HIPAA, SANS and PCI.

  • Check

    Describe an overview of the design, roles and function of server and user administration.

  • Check

    Understand the concept of patching and endpoint protection as it relates to client system administration.

  • Check

    Define encryption, encoding, hashing and digital certificates as it relates to cryptography

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Ca. 12 Stunden zum Abschließen

Empfohlen: 17 hours/week...

Englisch

Untertitel: Englisch

Kursteilnehmer, die sich für Course entscheiden, sind

  • Security Engineers
  • Technical Support Associates
  • Administrators
  • Teachers
  • Software Engineers

Lehrplan - Was Sie in diesem Kurs lernen werden

Woche
1
4 Stunden zum Abschließen

Compliance Frameworks and Industry Standards

13 Videos (Gesamt 61 min), 8 Lektüren, 5 Quiz
13 Videos
What will you learn in this module?1m
What Cybersecurity Challenges do Organizations Face?7m
Compliance Basics9m
Overview of US Cybersecurity Federal Law2m
National Institute of Standards and Technology (NIST) Overview1m
General Data Protection Regulation (GDPR) Overview3m
International Organization for Standardization (ISO) 2700x3m
SOC Reports8m
SOC Reports - Auditor Process Overview4m
Health Insurance Portability and Accountability Act (HIPAA)7m
Payment Card Industry Data Security Standard (PCI DSS)6m
Center for Internet Security (CIS) Critical Security Controls4m
8 Lektüren
Earn an IBM digital badge10m
About this course5m
National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls25m
Examples of Current GDPR Intention to Fine15m
American Institute of CPAs (AICPA) Website research40m
HIPAA Cybersecurity guidance15m
Compliance and Industry Standards Summary10m
Center for Internet Security (CIS) Critical Security Controls10m
5 praktische Übungen
Compliance and Regulations for Cybersecurity8m
System and Organization Controls Report (SOC) Overview2m
Industry Standards6m
CIS Critical Security Controls2m
Compliance Frameworks and Industry Standards25m
Woche
2
3 Stunden zum Abschließen

Client System Administration, Endpoint Protection and Patching

7 Videos (Gesamt 38 min), 4 Lektüren, 3 Quiz
7 Videos
Client System Administration7m
Endpoint Protection6m
Endpoint Protection and Response4m
Unified Endpoint Management8m
Overview of Patching3m
Windows Patching7m
4 Lektüren
4 Social Engineering Threats to Keep an Eye on — and How to Stop Them20m
Endpoint Protection - Additional Vendor Solutions10m
Unified Endpoint for Dummies50m
Patch Management Best Practices20m
3 praktische Übungen
Client System Administration and Endpoint Protection4m
Patching4m
Client System Administration, Endpoint Protection and Patching15m
Woche
3
4 Stunden zum Abschließen

Server and User Administration

21 Videos (Gesamt 119 min), 3 Lektüren, 3 Quiz
21 Videos
User and Kernel Modes4m
Files Systems3m
Directory Structure6m
Role-Based Access Control and Permissions6m
Local User Accounts4m
Windows 10 Security App3m
Features of Active Directory5m
Active Directory Accounts and Security Considerations13m
Overview of Server Management with Windows Admin Center4m
Kerberos Authentication and Logs7m
Windows Auditing Overview6m
Introduction to Linux2m
Linux File Systems and Directory Structure4m
Linux Run Levels2m
Exploring the Shell2m
Linux Internal and External Commands4m
Linux Basic Commands- Part 110m
Linux Basic Commands- Part 25m
Linux Basic Commands Part 310m
Demonstration of Samba Installation and Configuration5m
3 Lektüren
Securing privileged access against Threats10m
Beginning your General Data Protection Regulation (GDPR) Journey for Windows Server35m
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide20m
3 praktische Übungen
Windows Administration8m
Linux Basics4m
Server and User Administration20m
Woche
4
3 Stunden zum Abschließen

Cryptography and Compliance Pitfalls

13 Videos (Gesamt 51 min), 5 Lektüren, 2 Quiz
13 Videos
Cryptography- An Introduction3m
Cryptography- the Basics7m
Common Cryptography Pitfalls12m
Encrypting Data at Rest2m
Encrypting Data in Use1m
Encrypting Data in Transit7m
Hashing7m
Digital Signatures1m
Safeguarding Encryption Keys2m
Impact of Quantum Computing2m
Key Takeaways - Cryptography and Encryption1m
Thank you4
5 Lektüren
Additional Review of Cryptographic exposures20m
Digital Signature reading - National Institute of Standards and Technology (NIST)20m
Additional Quantum Computing Research25m
Cryptographic Weaknesses - SANS Top 2520m
Additional Cryptography and Encryption Examples10m
2 praktische Übungen
Cryptography Basics8m
Cryptography and Compliance Pitfalls15m

Dozent

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

Über IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

Über den Spezialisierung IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Häufig gestellte Fragen

  • Sobald Sie sich für ein Zertifikat angemeldet haben, haben Sie Zugriff auf alle Videos, Quizspiele und Programmieraufgaben (falls zutreffend). Aufgaben, die von anderen Kursteilnehmern bewertet werden, können erst dann eingereicht und überprüft werden, wenn Ihr Unterricht begonnen hat. Wenn Sie sich den Kurs anschauen möchten, ohne ihn zu kaufen, können Sie womöglich auf bestimmte Aufgaben nicht zugreifen.

  • Wenn Sie sich für den Kurs anmelden, erhalten Sie Zugriff auf alle Kurse der Spezialisierung und Sie erhalten nach Abschluss aller Arbeiten ein Zertifikat. Ihr elektronisches Zertifikat wird zu Ihrer Seite „Errungenschaften“ hinzugefügt – von dort können Sie Ihr Zertifikat ausdrucken oder es zu Ihrem LinkedIn Profil hinzufügen. Wenn Sie nur lesen und den Inhalt des Kurses anzeigen möchten, können Sie kostenlos als Gast an dem Kurs teilnehmen.

Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..