Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!
Knowledge delivery is exceptional. Content is to the point and the tests really pinpoint the attention level of the volunteer taking the course.Thank you for designing such a knowledgeable course
von Usama R•
the overall sound quality was a bit hard to understand at some places but the information given and the way of teaching and the level of understanding all things were great.
von Rebecca P•
The course provided a sound foundation of concepts to take a step-wise learning path to understand the requirements of operation and assurance of security. I learned alot!
von N'dri A T P•
This course focuses on technical skills and process for IT security management, virtualization and cloud computing. You will learn all features of operating systems.
von Олеся К•
Thank you for a very interesting and useful course! The information is well systematized and illustrated. Test items are interesting and understandable.
von Alnawaz M•
Course material was very helpful. However, it would have been nice if the contents was cross referenced with the videos for language and comprehension.
von Pavan K M•
Theory was a bit hard to go through but later on the Technical part will be easy if you are familiar with the Cybersecurity world Loved the course
von Andreea-Ioana B•
I have easily learned so much precious information during this course! I definitely recommend this to anyone interested in the cybersecurity area.
von kumar r•
ver y much interesting course as here we not only learns how cyber security threats occurs and how to deal with it and also about cloud computing
von Arjun B•
I felt like this course is very good for understanding different topics in Cyber Security. It can be considered as basic knowledge in the field.
von Sai K•
Very informative course for people interested in getting basic knowledge about cybersecurity. The topics are explained well by the instructors.
von lai y•
For this whole Module to let me know more about the OS of Window ,Linux and Mac . Cloud Computing and …. i will continue to the next module
von Karan m•
The audio quality is really bad, apart from a few lessons, most of the lectures are almost inaudible. Still a 5 star for the content.
von Devik J•
This course is amazing.it's good course for cyber security students and IT students and for that who have to learn cyber security.
von Farah A•
Great overview and information regarding cybersecurity visualization, cloud security and computing, the ITIL life cycle and more.
Excellent content. Good overview of various OS, including Win 10, Linux, and Mac. I enjoyed the industry readings such as OWASP.
von Muhammad S•
This course provides a basic level of knowledge of cloud computing models and operating system commands and their file systems.
von Vibhanshu s•
Provides the information that it was intended to provide, which is basics of cybersecurity roles, process and operating systems
von Md. M S•
its a helpful course to learn about basic of Cybersecurity roles and operating system security. thanks IBM, thanks instructors
von Dwayne N•
I loved it, the course has just the right information. Though it it can be tough at times. but worthwhile and very beneficial.
Thank you so much for the helpful courses, it helps me so much to enrich my knowledge to the next level about Cybersecurity!
von Lakshay P•
At first i was hating this course design but now..its really great only what we need pay attention on videos and make notes.
It is a good introductory level course to understand the fundamentals of Cyber Security, Cloud Computing and Virtualization
von URK18CS065 P R•
well informative,starting off with basics and ending up with a bit of cloud computing,overall happy to attend the course>3
von NURUL W R K•
It was really helpful for me. Beside to increase my knowledge about security also about every unique platform. Thank you
von Parvathi n•
It is very useful,good pratice for me and to more details about cyber security roles, process &operating ayatem security