This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field.
ofrecido por


Acerca de este Curso
Resultados profesionales del estudiante
12%
15%
Qué aprenderás
Discuss the evolution of security based on historical events.
List various types of malicious software.
Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.
Identify key cybersecurity tools which include the following: firewall, anti-virus, cryptography, penetration testing and digital forensics.
Habilidades que obtendrás
- Information Security (INFOSEC)
- IBM New Collar
- Malware
- Cybersecurity
- Cyber Attacks
Resultados profesionales del estudiante
12%
15%
ofrecido por

IBM
IBM is the global leader in business transformation through an open hybrid cloud platform and AI, serving clients in more than 170 countries around the world. Today 47 of the Fortune 50 Companies rely on the IBM Cloud to run their business, and IBM Watson enterprise AI is hard at work in more than 30,000 engagements. IBM is also one of the world’s most vital corporate research organizations, with 28 consecutive years of patent leadership. Above all, guided by principles for trust and transparency and support for a more inclusive society, IBM is committed to being a responsible technology innovator and a force for good in the world.
Programa - Qué aprenderás en este curso
History of Cybersecurity
This module will give you a brief overview of the history of cybersecurity. You will also learn key terms and roles in cybersecurity.
A brief overview of types of actors and their motives
This module will provide you with a brief overview of types of actors and their motives. You will also understand different types of attacks and their impact on an organization and individuals. You will also learn about tools that are available to you to assist in any cybersecurity investigation.
An overview of key security concepts
This module will describe various key security concepts that are important in any cybersecurity position. The CIA Triad will be further explained. You will also begin to learn the significance of incident response and frameworks around cybersecurity. Finally, you will get an overview of IT Governance best practices and compliance.
An overview of key security tools
In this module, you will be introduced to key security tools including firewalls, anti-virus and cryptography. You will explore penetration testing and digital forensics. You will learn where you can get resources on industry and current threats to assist in further research around cybersecurity.
Reseñas
- 5 stars68,42 %
- 4 stars22,72 %
- 3 stars5,52 %
- 2 stars1,66 %
- 1 star1,67 %
Principales reseñas sobre INTRODUCTION TO CYBERSECURITY TOOLS & CYBER ATTACKS
The quality for the material needs to be improved in terms of visualization and audio. The title is little bit misleading as i expect to be more insides to Cybersecurity tools like nmap nesus etc...
The reading link to Week 03's Framework and their purpose is Broken. Please Fix it. Everything else seemed perfect. I would recommend this course for people who think of starting their careers in CyS.
it's helpful it can help you to know about cybersecurity history from where it all start and where it is now and also it wil help you to leran about melicious codes, software, attack, and many more
I've learned a lot! Plenty of information to retain. I love the challenge, I look forward to furthering my education in Cyber Security to not only better myself, but the cyber world! Thank you!
Preguntas Frecuentes
¿Cuándo podré acceder a las lecciones y tareas?
¿Qué recibiré si me suscribo a este Certificado?
¿Cuál es la política de reembolsos?
¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.