Acerca de este Curso
36,567 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 14 horas para completar

Sugerido: 23 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Qué aprenderás

  • Check

    Understand network basics around the TCP/IP and OSI Models.

  • Check

    Recount DNS, DHCP, Switching and Routing concepts.

  • Check

    Understand IP Addressing, Network Address Translation and Packet Sniffing.

  • Check

    Describe the structures and vulnerabilities of key databases for cybersecurity including SQL, Couch, Oracle and MongoDB.

Habilidades que obtendrás

database vulnerabilitiesNetwork SecuritySql InjectionCybersecuritynetworking basics

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 14 horas para completar

Sugerido: 23 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
3 horas para completar

TCP/IP Framework

16 videos (Total 71 minutos), 3 lecturas, 4 cuestionarios
16 videos
Welcome to Introduction to TCP/IP Framework34s
Stateless Inspection5m
Stateful Inspection5m
Firewall Filters- IDS and IPS Systems6m
The Difference between IDS and IPS Systems2m
Network Address Translation5m
An Introduction to Local Area Networks6m
Ethernet and LAN - Ethernet Operations5m
Ethernet and LAN - Network Devices4m
Introduction to Basic Network Routing1m
Layer 2 and Layer 3 Network Addressing4m
Address Resolution Protocol8m
Routers and Routing Tables, Part 12m
Routers and Routing Tables, Part 22m
Routers and Routing Tables, Part 36m
3 lecturas
Earn an IBM digital badge10m
About this course5m
Research of Network Vendor Training20m
4 ejercicios de práctica
Introduction to the TCP/IP Protocol Framework10m
Network Protocols over Ethernet and Local Area Networks12m
Basics of Routing and Switching, Network Packets and Structures12m
TCP/IP Framework30m
Semana
2
2 horas para completar

Basics of IP Addressing and the OSI Model

16 videos (Total 71 minutos), 6 cuestionarios
16 videos
IP Addressing - The Basics of Binary4m
IP Address Structure and Network Classes4m
IP Protocol and Traffic Routing6m
Introduction to the IPv6 Address Schema3m
Application and Transport Protocols UDP and TCP, Part 12m
Application and Transport Protocols UDP and TCP, Part 26m
DNS and DHCP4m
Syslog Message Logging Protocol3m
Flows and Network Analysis3m
Port Mirroring and Promiscuous Mode2m
Next Generation Firewalls - Overview4m
NGFW and the OSI Model2m
NGFW Packet Flow Example and NGFW Comparisons6m
Intrusion Detection and Intrusion Prevention Systems5m
High Availability and Clustering9m
6 ejercicios de práctica
Basics of IP Addressing16m
TCP/IP Layer 4, Transport Layer Overview6m
TCP/IP Layer 5, Application Layer Overview12m
Firewalls, Intrusion Detection and Intrusion Prevention Systems8m
Clustering and High Availability Systems2m
Basics of IP Addressing and the OSI Model30m
Semana
3
3 horas para completar

Introduction to Databases

18 videos (Total 88 minutos), 1 lectura, 4 cuestionarios
18 videos
Data Source Types Part 15m
Data Source Types Part 25m
Data Model Types4m
Structured Data7m
Securing the Crown Jewels8m
Leveraging Security Industry Best Practices1m
Structured Data and Relational Databases1m
Anatomy of a Vulnerability Assessment Test Report2m
Securing Data Sources by Type8m
Securing Databases Wrap Up2m
Data Monitoring4m
Data Alerts3m
Data Activity Reporting8m
Attributes to Include in Logging6m
Failed Access Monitoring2m
Suspicious Access Events, Part 14m
Suspicious Access Events, Part 27m
1 lectura
Data Breach Feeds25m
4 ejercicios de práctica
Types of Data8m
Securing Databases12m
A Data Protection Solution Example, IBM Security Guadium Use Cases16m
Introduction to Databases25m
Semana
4
2 horas para completar

Deep Dive - Injection Vulnerability

9 videos (Total 45 minutos), 1 lectura, 4 cuestionarios
9 videos
Introduction to Injection Flaws3m
OS Command Injection Part 18m
OS Command Injection Part 25m
OS Command Injection Part 37m
SQL Injection Part 18m
SQL Injection Part 26m
Other Types of Injection4m
Thank you for attending this course18s
1 lectura
Additional Resources35m
4 ejercicios de práctica
Injection Vulnerability12m
SQL Injection8m
Deep Dive - Injection Vulnerability24m
Opt-in to receive your badge!

Instructor

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

Acerca de IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

Acerca de Programa especializado IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.