Acerca de este Curso

227,316 vistas recientes
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 16 horas para completar
Inglés (English)
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 16 horas para completar
Inglés (English)

Instructor

ofrecido por

Placeholder

IBM

Programa - Qué aprenderás en este curso

Calificación del contenidoThumbs Up97%(3,931 calificaciones)Info
Semana
1

Semana 1

6 horas para completar

Compliance Frameworks and Industry Standards

6 horas para completar
13 videos (Total 61 minutos), 8 lecturas, 5 cuestionarios
13 videos
What will you learn in this module?1m
What Cybersecurity Challenges do Organizations Face?7m
Compliance Basics9m
Overview of US Cybersecurity Federal Law2m
National Institute of Standards and Technology (NIST) Overview1m
General Data Protection Regulation (GDPR) Overview3m
International Organization for Standardization (ISO) 2700x3m
SOC Reports8m
SOC Reports - Auditor Process Overview4m
Health Insurance Portability and Accountability Act (HIPAA)7m
Payment Card Industry Data Security Standard (PCI DSS)6m
Center for Internet Security (CIS) Critical Security Controls4m
8 lecturas
Earn an IBM digital badge10m
About this course5m
National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls25m
Examples of Current GDPR Intention to Fine15m
American Institute of CPAs (AICPA) Website research40m
HIPAA Cybersecurity guidance15m
Compliance and Industry Standards Summary10m
Center for Internet Security (CIS) Critical Security Controls10m
5 ejercicios de práctica
Compliance and Regulations for Cybersecurity30m
System and Organization Controls Report (SOC) Overview30m
Industry Standards30m
CIS Critical Security Controls30m
Compliance Frameworks and Industry Standards25m
Semana
2

Semana 2

4 horas para completar

Client System Administration, Endpoint Protection and Patching

4 horas para completar
7 videos (Total 38 minutos), 4 lecturas, 3 cuestionarios
7 videos
Client System Administration7m
Endpoint Protection6m
Endpoint Protection and Response4m
Unified Endpoint Management8m
Overview of Patching3m
Windows Patching7m
4 lecturas
4 Social Engineering Threats to Keep an Eye on — and How to Stop Them20m
Endpoint Protection - Additional Vendor Solutions10m
Unified Endpoint for Dummies50m
Patch Management Best Practices20m
3 ejercicios de práctica
Client System Administration and Endpoint Protection30m
Patching30m
Client System Administration, Endpoint Protection and Patching15m
Semana
3

Semana 3

4 horas para completar

Server and User Administration

4 horas para completar
21 videos (Total 119 minutos), 3 lecturas, 3 cuestionarios
21 videos
User and Kernel Modes4m
Files Systems3m
Directory Structure6m
Role-Based Access Control and Permissions6m
Local User Accounts4m
Windows 10 Security App3m
Features of Active Directory5m
Active Directory Accounts and Security Considerations13m
Overview of Server Management with Windows Admin Center4m
Kerberos Authentication and Logs7m
Windows Auditing Overview6m
Introduction to Linux2m
Linux File Systems and Directory Structure4m
Linux Run Levels2m
Exploring the Shell2m
Linux Internal and External Commands4m
Linux Basic Commands- Part 110m
Linux Basic Commands- Part 25m
Linux Basic Commands Part 310m
Demonstration of Samba Installation and Configuration5m
3 lecturas
Securing privileged access against Threats10m
Beginning your General Data Protection Regulation (GDPR) Journey for Windows Server35m
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide20m
3 ejercicios de práctica
Windows Administration30m
Linux Basics30m
Server and User Administration20m
Semana
4

Semana 4

3 horas para completar

Cryptography and Compliance Pitfalls

3 horas para completar
13 videos (Total 51 minutos), 5 lecturas, 2 cuestionarios
13 videos
Cryptography- An Introduction3m
Cryptography- the Basics7m
Common Cryptography Pitfalls12m
Encrypting Data at Rest2m
Encrypting Data in Use1m
Encrypting Data in Transit7m
Hashing7m
Digital Signatures1m
Safeguarding Encryption Keys2m
Impact of Quantum Computing2m
Key Takeaways - Cryptography and Encryption1m
Thank you4s
5 lecturas
Additional Review of Cryptographic exposures20m
Digital Signature reading - National Institute of Standards and Technology (NIST)20m
Additional Quantum Computing Research25m
Cryptographic Weaknesses - SANS Top 2520m
Additional Cryptography and Encryption Examples10m
2 ejercicios de práctica
Cryptography Basics8m
Cryptography and Compliance Pitfalls15m

Reseñas

Principales reseñas sobre CYBERSECURITY COMPLIANCE FRAMEWORK & SYSTEM ADMINISTRATION

Ver todas las reseñas

Preguntas Frecuentes

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.