Chevron Left
Zurück zu Cybersecurity Roles, Processes & Operating System Security

Kursteilnehmer-Bewertung und -Feedback für Cybersecurity Roles, Processes & Operating System Security von IBM

4.6
22 Bewertungen
5 Bewertungen

Über den Kurs

This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: ● Understand the key cybersecurity roles within an Organization. ● List key cybersecurity processes and an example of each process. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile. ● Understand the concept of Virtualization as it relates to cybersecurity Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-roles-processes-operating-system-security...
Filtern nach:

1 - 5 von 5 Bewertungen für Cybersecurity Roles, Processes & Operating System Security

von Elimane N

Aug 26, 2019

Rich and very usefull course!

von GABRIEL G M

Jul 19, 2019

hay videos que presentan informacion equivocada y/o desactualizada.

von sadra z

Aug 28, 2019

Very useful and necessary for starting in the path of Cyber Security but some videos had poor graphic and sound qualities

von Jay B

Sep 04, 2019

"Cybersecurity Roles, Processes, and OS Security" contained some redundant material (in week 1 and 2) from the previous course, "Introduction to Cybersecurity Tools and Cyber Attacks", regarding access management and CIA triade. However, weeks 3 and 4 on OS and virtualization were good introductions. I would suggest to add more security material regarding Windows and Linux however, because there is barely anything about it. The title of the course is thus slightly misleading.

von Marty A

Sep 05, 2019

Some of the material overlaps with the previous course. Videos can be a bit rambling, and quizzes could be improved by using clarifying language and de-emphasizing trivia questions. The material on Linux and Windows is a good intro to how the operating systems, but not especially meaty on security measures. The cloud modules suffer from the same -- they introduce basic concepts but do not cover what you can do to secure VMs. OSX doesn't even get a video. Most useful in terms of getting the hang of manager-level language about security.