Acerca de este Curso

289,739 vistas recientes
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 10 horas para completar
Inglés (English)
Subtítulos: Inglés (English)

Qué aprenderás

  • Understand network basics around the TCP/IP and OSI Models.

  • Recount DNS, DHCP, Switching and Routing concepts.

  • Understand IP Addressing, Network Address Translation and Packet Sniffing.

  • Describe the structures and vulnerabilities of key databases for cybersecurity including SQL, Couch, Oracle and MongoDB.

Habilidades que obtendrás

database vulnerabilitiesNetwork SecuritySql InjectionCybersecuritynetworking basics
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 10 horas para completar
Inglés (English)
Subtítulos: Inglés (English)

Instructor

ofrecido por

Logotipo de IBM

IBM

Programa - Qué aprenderás en este curso

Calificación del contenidoThumbs Up86%(1,742 calificaciones)Info
Semana
1

Semana 1

3 horas para completar

TCP/IP Framework

3 horas para completar
16 videos (Total 59 minutos), 3 lecturas, 4 cuestionarios
16 videos
Welcome to Introduction to TCP/IP Framework34s
Stateless Inspection4m
Stateful Inspection4m
Firewall Filters- IDS and IPS Systems5m
The Difference between IDS and IPS Systems2m
Network Address Translation4m
An Introduction to Local Area Networks6m
Ethernet and LAN - Ethernet Operations4m
Ethernet and LAN - Network Devices5m
Introduction to Basic Network Routing53s
Layer 2 and Layer 3 Network Addressing4m
Address Resolution Protocol6m
Routers and Routing Tables, Part 12m
Routers and Routing Tables, Part 21m
Routers and Routing Tables, Part 35m
3 lecturas
Earn an IBM digital badge10m
About this course5m
Research of Network Vendor Training20m
4 ejercicios de práctica
Introduction to the TCP/IP Protocol Framework10m
Network Protocols over Ethernet and Local Area Networks12m
Basics of Routing and Switching, Network Packets and Structures12m
TCP/IP Framework30m
Semana
2

Semana 2

3 horas para completar

Basics of IP Addressing and the OSI Model

3 horas para completar
16 videos (Total 80 minutos)
16 videos
IP Addressing - The Basics of Binary8m
IP Address Structure and Network Classes5m
IP Protocol and Traffic Routing6m
Introduction to the IPv6 Address Schema4m
Application and Transport Protocols UDP and TCP, Part 15m
Application and Transport Protocols UDP and TCP, Part 27m
DNS and DHCP4m
Syslog Message Logging Protocol3m
Flows and Network Analysis3m
Port Mirroring and Promiscuous Mode2m
Next Generation Firewalls - Overview4m
NGFW and the OSI Model2m
NGFW Packet Flow Example and NGFW Comparisons6m
Intrusion Detection and Intrusion Prevention Systems5m
High Availability and Clustering9m
6 ejercicios de práctica
Basics of IP Addressing16m
TCP/IP Layer 4, Transport Layer Overview6m
TCP/IP Layer 5, Application Layer Overview12m
Firewalls, Intrusion Detection and Intrusion Prevention Systems8m
Clustering and High Availability Systems2m
Basics of IP Addressing and the OSI Model30m
Semana
3

Semana 3

3 horas para completar

Introduction to Databases

3 horas para completar
18 videos (Total 88 minutos), 1 lectura, 4 cuestionarios
18 videos
Data Source Types Part 15m
Data Source Types Part 25m
Data Model Types4m
Structured Data7m
Securing the Crown Jewels8m
Leveraging Security Industry Best Practices1m
Structured Data and Relational Databases1m
Anatomy of a Vulnerability Assessment Test Report2m
Securing Data Sources by Type8m
Securing Databases Wrap Up2m
Data Monitoring4m
Data Alerts3m
Data Activity Reporting8m
Attributes to Include in Logging6m
Failed Access Monitoring2m
Suspicious Access Events, Part 14m
Suspicious Access Events, Part 27m
1 lectura
Data Breach Feeds25m
4 ejercicios de práctica
Types of Data8m
Securing Databases12m
A Data Protection Solution Example, IBM Security Guardium Use Cases16m
Introduction to Databases25m
Semana
4

Semana 4

2 horas para completar

Deep Dive - Injection Vulnerability

2 horas para completar
9 videos (Total 45 minutos), 1 lectura, 4 cuestionarios
9 videos
Introduction to Injection Flaws3m
OS Command Injection Part 18m
OS Command Injection Part 25m
OS Command Injection Part 37m
SQL Injection Part 18m
SQL Injection Part 26m
Other Types of Injection4m
Thank you for attending this course18s
1 lectura
Additional Resources35m
4 ejercicios de práctica
Injection Vulnerability12m
SQL Injection8m
Deep Dive - Injection Vulnerability24m
Opt-in to receive your badge!

Revisiones

Principales revisiones sobre NETWORK SECURITY & DATABASE VULNERABILITIES

Ver todos los comentarios

Preguntas Frecuentes

  • Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:

    • The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.

    • The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.

  • When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.