Acerca de este Programa Especializado
3,449 vistas recientes

Cursos 100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Cronograma flexible

Establece y mantén fechas de entrega flexibles.

Nivel principiante

Aprox. 1 meses para completar

Sugerido 15 horas/semana

Inglés (English)

Subtítulos: Inglés (English)

Habilidades que obtendrás

Operating System Securitydatabase vulnerabilitiesCybersecuritynetworking basicsCyber Attacks

Cursos 100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Cronograma flexible

Establece y mantén fechas de entrega flexibles.

Nivel principiante

Aprox. 1 meses para completar

Sugerido 15 horas/semana

Inglés (English)

Subtítulos: Inglés (English)

Cómo funciona Programa Especializado

Toma cursos

Un programa especializado de Coursera es un conjunto de cursos que te ayudan a dominar una aptitud. Para comenzar, inscríbete en el programa especializado directamente o échale un vistazo a sus cursos y elige uno con el que te gustaría comenzar. Al suscribirte a un curso que forme parte de un programa especializado, quedarás suscrito de manera automática al programa especializado completo. Puedes completar solo un curso: puedes pausar tu aprendizaje o cancelar tu suscripción en cualquier momento. Visita el panel principal del estudiante para realizar un seguimiento de tus inscripciones a cursos y tu progreso.

Proyecto práctico

Cada programa especializado incluye un proyecto práctico. Necesitarás completar correctamente el proyecto para completar el programa especializado y obtener tu certificado. Si el programa especializado incluye un curso separado para el proyecto práctico, necesitarás completar cada uno de los otros cursos antes de poder comenzarlo.

Obtén un certificado

Cuando completes todos los cursos y el proyecto práctico, obtendrás un Certificado que puedes compartir con posibles empleadores y tu red profesional.

how it works

Hay 4 cursos en este Programa Especializado

Curso1

Introduction to Cybersecurity Tools & Cyber Attacks

This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field. You will learn about critical thinking and its importance to anyone looking to pursue a career in Cybersecurity. Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the first course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Introduction to Cybersecurity Tools & Cyber Attacks IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/introduction-to-cybersecurity-tools-cyber-attacks

...
Curso2

Cybersecurity Roles, Processes & Operating System Security

This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: ● Understand the key cybersecurity roles within an Organization. ● List key cybersecurity processes and an example of each process. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile. ● Understand the concept of Virtualization as it relates to cybersecurity Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-roles-processes-operating-system-security

...
Curso3

Cybersecurity Compliance Framework & System Administration

This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization. You will learn the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems. You will learn the concepts of endpoint security and patch management. Both of these topics are important to keep systems current to avoid cybersecurity incidents against an organization. Finally you will learn in depth skills around cryptography and encryption to understand how these concepts affect software within a company. This course is intended for anyone who wants to gain a basic understanding of Security Frameworks, Compliance, endpoint management, encryption or cryptography or as the third course in a series of courses to gain the skill as a Jr Cybersecurity analyst.

...
Curso4

Network Security & Database Vulnerabilities

This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks. In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch. You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. This course is intended for anyone who wants to gain a basic understanding of Network Security/Database Vulnerabilities or as the fourth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.

...

Instructores

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

Acerca de IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

Preguntas Frecuentes

  • ¡Sí! Para empezar, haz clic en la tarjeta del curso que te interesa e inscríbete. Puedes inscribirte y completar el curso para obtener un certificado que puedes compartir o puedes acceder al curso como oyente para ver los materiales del curso de manera gratuita. Cuando cancelas la suscripción de un curso que forma parte de un programa especializado, se cancela automáticamente la suscripción de todo el programa especializado. Visita el panel del estudiante para realizar un seguimiento de tu progreso.

  • Este curso es completamente en línea, de modo que no necesitas ir a un aula en persona. Puedes acceder a tus lecciones, lecturas y tareas en cualquier momento y cualquier lugar a través de Internet o tu dispositivo móvil.

  • Este programa especializado no otorga crédito universitario, pero algunas universidades pueden aceptar los Certificados del programa especializado para el crédito. Consulta con tu institución para obtener más información.

  • It typically takes between 2 to 4 months to complete the 4 courses. But some learners may go through the content faster.

  • No previous cybersecurity knowledge is required, but basic computer usage is recommended.

  • No, although recommended.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.