Acerca de este Curso
5,757 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Aprox. 17 horas para completar

Sugerido: 11 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Qué aprenderás

  • Check

    List and describe several key cybersecurity compliance and industry standards including NIST, GDPR, HIPAA, SANS and PCI.

  • Check

    Describe an overview of the design, roles and function of server and user administration.

  • Check

    Understand the concept of patching and endpoint protection as it relates to client system administration.

  • Check

    Define encryption, encoding, hashing and digital certificates as it relates to cryptography

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Aprox. 17 horas para completar

Sugerido: 11 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Los estudiantes que toman este Course son

  • Technical Support Associates
  • Software Engineers

Programa - Qué aprenderás en este curso

Semana
1
3 horas para completar

Compliance Frameworks and Industry Standards

13 videos (Total 61 minutos), 7 lecturas, 5 cuestionarios
13 videos
What will you learn in this module?1m
What Cybersecurity Challenges do Organizations Face?7m
Compliance Basics9m
Overview of US Cybersecurity Federal Law2m
National Institute of Standards and Technology (NIST) Overview1m
General Data Protection Regulation (GDPR) Overview3m
International Organization for Standardization (ISO) 2700x3m
SOC Reports8m
SOC Reports - Auditor Process Overview4m
Health Insurance Portability and Accountability Act (HIPAA)7m
Payment Card Industry Data Security Standard (PCI DSS)6m
Center for Internet Security (CIS) Critical Security Controls4m
7 lecturas
Earn an IBM digital badge10m
National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls25m
Examples of Current GDPR Intention to Fine2m
American Institute of CPAs (AICPA) Website research40m
HIPAA Cybersecurity guidance1m
Compliance and Industry Standards Summary10m
Center for Internet Security (CIS) Critical Security Controls2m
5 ejercicios de práctica
Compliance and Regulations for Cybersecurity8m
System and Organization Controls Report (SOC) Overview2m
Industry Standards6m
CIS Critical Security Controls2m
Compliance Frameworks and Industry Standards25m
Semana
2
3 horas para completar

Client System Administration, Endpoint Protection and Patching

7 videos (Total 38 minutos), 4 lecturas, 3 cuestionarios
7 videos
Client System Administration7m
Endpoint Protection6m
Endpoint Protection and Response4m
Unified Endpoint Management8m
Overview of Patching3m
Windows Patching7m
4 lecturas
4 Social Engineering Threats to Keep an Eye on — and How to Stop Them20m
Endpoint Protection - Additional Vendor Solutions10m
Unified Endpoint for Dummies50m
Patch Management Best Practices20m
3 ejercicios de práctica
Client System Administration and Endpoint Protection4m
Patching4m
Client System Administration, Endpoint Protection and Patching15m
Semana
3
3 horas para completar

Server and User Administration

21 videos (Total 119 minutos), 3 lecturas, 1 cuestionario
21 videos
User and Kernel Modes4m
Files Systems3m
Directory Structure6m
Role-Based Access Control and Permissions6m
Local User Accounts4m
Windows 10 Security App3m
Features of Active Directory5m
Active Directory Accounts and Security Considerations13m
Overview of Server Management with Windows Admin Center4m
Kerberos Authentication and Logs7m
Windows Auditing Overview6m
Introduction to Linux2m
Linux File Systems and Directory Structure4m
Linux Run Levels2m
Exploring the Shell2m
Linux Internal and External Commands4m
Linux Basic Commands- Part 110m
Linux Basic Commands- Part 25m
Linux Basic Commands Part 310m
Demonstration of Samba Installation and Configuration5m
3 lecturas
Securing privileged access against Threats10m
Beginning your General Data Protection Regulation (GDPR) Journey for Windows Server35m
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide20m
1 ejercicio de práctica
Windows Administration8m
Semana
4
2 horas para completar

Cryptography and Compliance Pitfalls

13 videos (Total 51 minutos), 5 lecturas
13 videos
Cryptography- An Introduction3m
Cryptography- the Basics7m
Common Cryptography Pitfalls12m
Encrypting Data at Rest2m
Encrypting Data in Use1m
Encrypting Data in Transit7m
Hashing7m
Digital Signatures1m
Safeguarding Encryption Keys2m
Impact of Quantum Computing2m
Key Takeaways - Cryptography and Encryption1m
Thank you4s
5 lecturas
Additional Review of Cryptographic exposures20m
Digital Signature reading - National Institute of Standards and Technology (NIST)20m
Additional Quantum Computing Research25m
Cryptographic Weaknesses - SANS Top 2520m
Additional Cryptography and Encryption Examples1m

Instructor

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

Acerca de IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

Acerca de Programa especializado IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.