Über diesen Kurs
4,742 kürzliche Aufrufe

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Stufe „Anfänger“

Ca. 17 Stunden zum Abschließen

Empfohlen: 11 hours/week...

Englisch

Untertitel: Englisch

Was Sie lernen werden

  • Check

    Understand network basics around the TCP/IP and OSI Models.

  • Check

    Recount DNS, DHCP, Switching and Routing concepts.

  • Check

    Understand IP Addressing, Network Address Translation and Packet Sniffing.

  • Check

    Describe the structures and vulnerabilities of key databases for cybersecurity including SQL, Couch, Oracle and MongoDB.

Kompetenzen, die Sie erwerben

database vulnerabilitiesNetwork SecuritySql InjectionCybersecuritynetworking basics
Kursteilnehmer, die sich für Course entscheiden, sind
  • Software Engineers

    100 % online

    Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

    Flexible Fristen

    Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

    Stufe „Anfänger“

    Ca. 17 Stunden zum Abschließen

    Empfohlen: 11 hours/week...

    Englisch

    Untertitel: Englisch

    Lehrplan - Was Sie in diesem Kurs lernen werden

    Woche
    1
    2 Stunden zum Abschließen

    TCP/IP Framework

    16 Videos (Gesamt 71 min), 2 Lektüren
    16 Videos
    Welcome to Introduction to TCP/IP Framework34
    Stateless Inspection5m
    Stateful Inspection5m
    Firewall Filters- IDS and IPS Systems6m
    The Difference between IDS and IPS Systems2m
    Network Address Translation5m
    An Introduction to Local Area Networks6m
    Ethernet and LAN - Ethernet Operations5m
    Ethernet and LAN - Network Devices4m
    Introduction to Basic Network Routing1m
    Layer 2 and Layer 3 Network Addressing4m
    Address Resolution Protocol8m
    Routers and Routing Tables, Part 12m
    Routers and Routing Tables, Part 22m
    Routers and Routing Tables, Part 36m
    2 Lektüren
    Earn an IBM digital badge10m
    Research of Network Vendor Training20m
    Woche
    2
    1 Stunde zum Abschließen

    Basics of IP Addressing and the OSI Model

    16 Videos (Gesamt 71 min)
    16 Videos
    IP Addressing - The Basics of Binary4m
    IP Address Structure and Network Classes4m
    IP Protocol and Traffic Routing6m
    Introduction to the IPv6 Address Schema3m
    Application and Transport Protocols UDP and TCP, Part 12m
    Application and Transport Protocols UDP and TCP, Part 26m
    DNS and DHCP4m
    Syslog Message Logging Protocol3m
    Flows and Network Analysis3m
    Port Mirroring and Promiscuous Mode2m
    Next Generation Firewalls - Overview4m
    NGFW and the OSI Model2m
    NGFW Packet Flow Example and NGFW Comparisons6m
    Intrusion Detection and Intrusion Prevention Systems5m
    High Availability and Clustering9m
    Woche
    3
    2 Stunden zum Abschließen

    Introduction to Databases

    16 Videos (Gesamt 76 min), 1 Lektüre
    16 Videos
    Data Source Types Part 15m
    Data Source Types Part 25m
    Data Model Types4m
    Structured Data7m
    Securing the Crown Jewels8m
    Leveraging Security Industry Best Practices1m
    Structured Data and Relational Databases1m
    Anatomy of a Vulnerability Assessment Test Report2m
    Securing Data Sources by Type8m
    Securing Databases Wrap Up2m
    Data Monitoring4m
    Data Alerts3m
    Data Activity Reporting8m
    Attributes to Include in Logging6m
    Failed Access Monitoring2m
    1 Lektüre
    Data Breach Feeds25m
    Woche
    4
    1 Stunde zum Abschließen

    Specific Database Example with Vulnerabilities

    7 Videos (Gesamt 45 min), 1 Lektüre
    7 Videos
    OS Command Injection Part 18m
    OS Command Injection Part 25m
    OS Command Injection Part 37m
    SQL Injection Part 18m
    SQL Injection Part 26m
    Other Types of Injection4m
    1 Lektüre
    Additional Resources35m

    Dozent

    IBM Security Learning Services

    IBM Global Subject Matter Experts
    IBM Security

    Über IBM

    IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

    Über den Spezialisierung IT Fundamentals for Cybersecurity

    There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
    IT Fundamentals for Cybersecurity

    Häufig gestellte Fragen

    • Sobald Sie sich für ein Zertifikat angemeldet haben, haben Sie Zugriff auf alle Videos, Quizspiele und Programmieraufgaben (falls zutreffend). Aufgaben, die von anderen Kursteilnehmern bewertet werden, können erst dann eingereicht und überprüft werden, wenn Ihr Unterricht begonnen hat. Wenn Sie sich den Kurs anschauen möchten, ohne ihn zu kaufen, können Sie womöglich auf bestimmte Aufgaben nicht zugreifen.

    • Wenn Sie sich für den Kurs anmelden, erhalten Sie Zugriff auf alle Kurse der Spezialisierung und Sie erhalten nach Abschluss aller Arbeiten ein Zertifikat. Ihr elektronisches Zertifikat wird zu Ihrer Seite „Errungenschaften“ hinzugefügt – von dort können Sie Ihr Zertifikat ausdrucken oder es zu Ihrem LinkedIn Profil hinzufügen. Wenn Sie nur lesen und den Inhalt des Kurses anzeigen möchten, können Sie kostenlos als Gast an dem Kurs teilnehmen.

    • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

    Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..