Acerca de este Curso

1,089,442 vistas recientes

Certificado para compartir

Obtén un certificado al finalizar

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 20 horas para completar

Inglés (English)

Subtítulos: Inglés (English)

Qué aprenderás

  • Discuss the evolution of security based on historical events.

  • List various types of malicious software.

  • Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.

  • Identify key cybersecurity tools which include the following:  firewall, anti-virus, cryptography, penetration testing and digital forensics.

Habilidades que obtendrás

Information Security (INFOSEC)IBM New CollarMalwareCybersecurityCyber Attacks

Certificado para compartir

Obtén un certificado al finalizar

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 20 horas para completar

Inglés (English)

Subtítulos: Inglés (English)

Instructor

ofrecido por

Logotipo de IBM

IBM

Programa - Qué aprenderás en este curso

Calificación del contenidoThumbs Up89%(6,743 calificaciones)Info
Semana
1

Semana 1

5 horas para completar

History of Cybersecurity

5 horas para completar
17 videos (Total 103 minutos), 9 lecturas, 7 cuestionarios
17 videos
Welcome to History of Cybersecurity1m
Cybersecurity Definition3m
Key Terms1m
Security Threats2m
Vulnerability Assessments2m
Roles in Security4m
From Ronald Reagan/War Games to where we are Today4m
The Impact of 9/11 on Cybersecurity10m
Cybersecurity Today7m
Cybersecurity Introduction7m
Things to consider when starting a Cybersecurity program1m
What is Security?8m
Additional Security Challenges9m
Beyond Technology: Critical Thinking in Cybersecurity4m
Critical Thinking: A Model8m
Critical Thinking - 5 Key Skills16m
9 lecturas
Earn an IBM digital badge5m
Your IBM Global Subject Matter Experts10m
The Insane Amounts of Data We're Using Every Minute (Infographic)10m
WiCys Organization Resources15m
The SANS Institute1m
OWASP - The Open Web Application Project1m
ISSA - Information Systems Security Association1m
FIRST- Forum of Incident Response and Security Teams10m
Additional Cybersecurity Industry Associations25m
7 ejercicios de práctica
Introduction to Cybersecurity Tools & Cyber Attacks30m
What are We Talking about when We Talk about Cybersecurity?20m
From Ronald Reagan to Where we are Today10m
Cybersecurity Programs10m
Cybersecurity - A Security Architect's Perspective15m
What is Critical Thinking?30m
History of Cybersecurity30m
Semana
2

Semana 2

6 horas para completar

A brief overview of types of actors and their motives

6 horas para completar
27 videos (Total 124 minutos), 2 lecturas, 7 cuestionarios
27 videos
A brief overview of types of actors and their motives5m
Hacking organizations3m
Major different types of cyber attacks6m
Security Attack Definition7m
Security services11m
Security Mechanisms6m
Network Security Model8m
Organizational Threats6m
Attacks6m
Security Architecture Attacks3m
Security Architecture -Attack models8m
Malware and Ransomware3m
Threat Examples1m
Threat Protection Defined2m
Internet Security Threats - Mapping2m
Internet Security Threats - Packet Sniffing2m
Security Threat - IP Spoofing1m
Security Threats - Denial of service2m
Security Attacks - Host insertions3m
The Cyber Kill Chain5m
What is Social Engineering?4m
Social Engineering - Phishing and Vishing3m
Cyberwarfare6m
Cybercrime Resources4m
X-Force Command Center Introduction2m
Javier's perspective on Cybersecurity Skills1m
2 lecturas
2019 Ponemon Institute Study on the Cyber Resilient Organization10m
X-Force Research20m
7 ejercicios de práctica
Types of Actors and their Motives30m
An Architect's perspective on attack classifications20m
Malware and an introduction to threat protection30m
Additional Attack examples today30m
Attacks and Cyber resources10m
A day in the life of a SOC analyst30m
A brief overview of types of actors and their motives50m
Semana
3

Semana 3

5 horas para completar

An overview of key security concepts

5 horas para completar
14 videos (Total 67 minutos), 4 lecturas, 5 cuestionarios
14 videos
CIA Triad - Confidentiality2m
CIA Triad - Integrity6m
CIA Triad - Availability3m
Non - Repudiation - How does it apply to CIA?2m
Access Management4m
Incidence Response5m
Key Concepts - Incident Response7m
Incident Response Process7m
Introduction to Frameworks and Best Practices4m
IT Governance Process5m
Cybersecurity Compliance and Audit Overview7m
Pentest Process and Mile 2 CPTE Training5m
OWASP framework2m
4 lecturas
OWASP Top 10 Project Findings 201715m
National Institute of Standards & Technology15m
National Initiative For Cybersecurity Education15m
Computer Security Incident Handling Guide20m
5 ejercicios de práctica
CIA Triad30m
Access Management30m
Incident Response30m
Frameworks and their purpose30m
Quiz: Key concepts35m
Semana
4

Semana 4

3 horas para completar

An overview of key security tools

3 horas para completar
16 videos (Total 68 minutos), 2 lecturas, 5 cuestionarios
16 videos
Introduction to Firewalls2m
Firewalls - Packet Filtering2m
Firewalls - Application Gateway4m
Firewalls - XML Gateway2m
Firewalls - Stateless and Stateful3m
Antivirus/Antimalware1m
An introduction of Cryptography5m
Types of Cryptography5m
Cryptographic Attacks2m
Cryptography - a different perspective from a Security architect14m
Penetration Testing Introduction6m
Pentest Methodologies9m
Vulnerability Tests4m
What is Digital Forensics?4m
Conclusion24s
2 lecturas
Securityintelligence.com25m
Incident Response and Digital Forensics: Will You Buy or Build?10m
5 ejercicios de práctica
Firewalls30m
Antivirus/Antimalware5m
Introduction to Cryptography12m
First look at Penetration Testing and Digital Forensics30m
Key security tools25m

Acerca de Programa especializado: IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. The instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist Want to see if this is a good career fit for you? IBM is collaborating with MyInnerGenius to help you find out which careers in IT you will love -- careers that are a great match for you -- regardless of your education or experience -- even if you’ve never considered a role in IT....
IT Fundamentals for Cybersecurity

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

  • Si estás suscrito, obtienes una prueba gratis de 7 días, que podrás cancelar cuando desees sin ningún tipo de penalidad. Una vez transcurrido ese tiempo, no realizamos reembolsos. No obstante, puedes cancelar tu suscripción cuando quieras. Consulta nuestra política completa de reembolsos.

  • Sí, Coursera ofrece ayuda económica a los estudiantes que no pueden pagar la tarifa. Solicítala haciendo clic en el enlace de Ayuda económica que está debajo del botón “Inscribirse” a la izquierda. Se te pedirá que completes una solicitud. Recibirás una notificación en caso de que se apruebe. Deberás completar este paso para cada uno de los cursos que forman parte del Programa especializado, incluido el proyecto final. Obtén más información.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.