Acerca de este Curso
31,875 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Aprox. 10 horas para completar

Sugerido: 17 hours/week...

Inglés (English)

Subtítulos: Inglés (English)
Los estudiantes que toman este Course son
  • Security Engineers
  • Technical Solutions Engineers
  • IT Support
  • Machine Learning Engineers
  • Technical Support Associates

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Aprox. 10 horas para completar

Sugerido: 17 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

2 horas para completar

People Process & Technology

9 videos (Total 48 minutos), 4 lecturas, 4 cuestionarios
9 videos
Overview of People, Process and Technologies1m
What is IT Security?42s
Frameworks and their purpose4m
Roles in Security4m
Introduction to Process4m
Business Process Management Overview14m
Information Technology Infrastructure Library (ITIL) Overview9m
Key ITIL Processes6m
4 lecturas
Earn an IBM digital badge5m
Your Subject Matter Experts10m
ITIL framework30m
What is IT Service Management?15m
4 ejercicios de práctica
Welcome to People, Process and Operating System Fundamentals for Cybersecurity4m
Frameworks, Policies and Roles4m
Business Process Management and IT Infrastructure Library Basics8m
People, Process and Technology20m
2 horas para completar

Examples & Principles of the CIA Triad

5 videos (Total 16 minutos), 1 lectura, 2 cuestionarios
5 videos
Who are Alice, Bob and Trudy?3m
Confidentiality, Integrity and Availability9m
Authenticity and Accountability1m
Priscilla Mariel Guzman Angulo - What's important for my job.1m
1 lectura
Threat Horizon 2019: Disruption. Distortion. Deterioration1h
2 ejercicios de práctica
Further discussion of confidentiality, integrity and availability6m
Principles of the CIA Triad10m
1 hora para completar

Authentication and Access Control

5 videos (Total 23 minutos), 1 lectura, 3 cuestionarios
5 videos
Identification and AAA7m
Access Control Methods3m
Access Control - Physical and Logical6m
Open Web Application Security Project (OWASP)3m
1 lectura
OWASP Top 10 Project20m
3 ejercicios de práctica
What is AAA?4m
Access Control4m
Authentication and Access control15m
1 hora para completar

Windows Operating System Security Basics

6 videos (Total 28 minutos), 4 cuestionarios
6 videos
User and Kernel Mode4m
File Systems3m
Directory Structure6m
Shortcuts and Commands5m
Additional Shortcuts6m
4 ejercicios de práctica
User and Kernel Modes2m
File Systems and Directory Structure4m
Shortcuts and Commands4m
Windows Operating System Security Basics20m
1 hora para completar

Linux Operating System Security Basics

4 videos (Total 21 minutos), 1 lectura, 4 cuestionarios
4 videos
File Systems6m
Basic Commands5m
Permissions and Owners6m
1 lectura
Pentestmonkey research20m
4 ejercicios de práctica
Key Components2m
File systems2m
Linux Basic Commands4m
Linux Operating System security basics20m
1 hora para completar

macOS Security Basics

1 video (Total 1 minutos), 1 lectura
1 lectura
macOS Developer resources45m
1 hora para completar

Overview of Virtualization

6 videos (Total 30 minutos), 2 lecturas, 2 cuestionarios
6 videos
An Overview of Virtualization3m
Virtualization to Cloud4m
What is Cloud Computing?12m
Cloud Benefits, Security and Governance7m
Wrap up20s
2 lecturas
SANS Institute research exercise3m
Differences between virtualization and cloud - RedHat20m
2 ejercicios de práctica
Virtualization Basics and Cloud Computing12m
Virtualization Basics15m
17 revisionesChevron Right

Principales revisiones sobre Cybersecurity Roles, Processes & Operating System Security

por AMOct 28th 2019

Course material was very helpful. However, it would have been nice if the contents was cross referenced with the videos for language and comprehension.

por LSOct 9th 2019

At first i was hating this course design but now..its really great only what we need pay attention on videos and make notes.


IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

Acerca de IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

Acerca de Programa especializado IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here:
IT Fundamentals for Cybersecurity

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.