About this Course
5,387 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 17 hours to complete

Suggested: 11 hours/week...

English

Subtitles: English
User
Learners taking this Course are
  • Software Engineers

What you will learn

  • Check

    List and describe several key cybersecurity compliance and industry standards including NIST, GDPR, HIPAA, SANS and PCI.

  • Check

    Describe an overview of the design, roles and function of server and user administration.

  • Check

    Understand the concept of patching and endpoint protection as it relates to client system administration.

  • Check

    Define encryption, encoding, hashing and digital certificates as it relates to cryptography

User
Learners taking this Course are
  • Software Engineers

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 17 hours to complete

Suggested: 11 hours/week...

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
3 hours to complete

Compliance Frameworks and Industry Standards

13 videos (Total 61 min), 7 readings, 5 quizzes
13 videos
What will you learn in this module?1m
What Cybersecurity Challenges do Organizations Face?7m
Compliance Basics9m
Overview of US Cybersecurity Federal Law2m
National Institute of Standards and Technology (NIST) Overview1m
General Data Protection Regulation (GDPR) Overview3m
International Organization for Standardization (ISO) 2700x3m
SOC Reports8m
SOC Reports - Auditor Process Overview4m
Health Insurance Portability and Accountability Act (HIPAA)7m
Payment Card Industry Data Security Standard (PCI DSS)6m
Center for Internet Security (CIS) Critical Security Controls4m
7 readings
Earn an IBM digital badge10m
National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls25m
Examples of Current GDPR Intention to Fine2m
American Institute of CPAs (AICPA) Website research40m
HIPAA Cybersecurity guidance1m
Compliance and Industry Standards Summary10m
Center for Internet Security (CIS) Critical Security Controls2m
5 practice exercises
Compliance and Regulations for Cybersecurity8m
System and Organization Controls Report (SOC) Overview2m
Industry Standards6m
CIS Critical Security Controls2m
Compliance Frameworks and Industry Standards25m
Week
2
3 hours to complete

Client System Administration, Endpoint Protection and Patching

7 videos (Total 38 min), 4 readings, 3 quizzes
7 videos
Client System Administration7m
Endpoint Protection6m
Endpoint Protection and Response4m
Unified Endpoint Management8m
Overview of Patching3m
Windows Patching7m
4 readings
4 Social Engineering Threats to Keep an Eye on — and How to Stop Them20m
Endpoint Protection - Additional Vendor Solutions10m
Unified Endpoint for Dummies50m
Patch Management Best Practices20m
3 practice exercises
Client System Administration and Endpoint Protection4m
Patching4m
Client System Administration, Endpoint Protection and Patching15m
Week
3
3 hours to complete

Server and User Administration

21 videos (Total 119 min), 3 readings, 1 quiz
21 videos
User and Kernel Modes4m
Files Systems3m
Directory Structure6m
Role-Based Access Control and Permissions6m
Local User Accounts4m
Windows 10 Security App3m
Features of Active Directory5m
Active Directory Accounts and Security Considerations13m
Overview of Server Management with Windows Admin Center4m
Kerberos Authentication and Logs7m
Windows Auditing Overview6m
Introduction to Linux2m
Linux File Systems and Directory Structure4m
Linux Run Levels2m
Exploring the Shell2m
Linux Internal and External Commands4m
Linux Basic Commands- Part 110m
Linux Basic Commands- Part 25m
Linux Basic Commands Part 310m
Demonstration of Samba Installation and Configuration5m
3 readings
Securing privileged access against Threats10m
Beginning your General Data Protection Regulation (GDPR) Journey for Windows Server35m
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide20m
1 practice exercise
Windows Administration8m
Week
4
1 hour to complete

Cryptography and Compliance Pitfalls

4 videos (Total 12 min), 1 reading
4 videos
Cryptography- An Introduction3m
Cryptography- the Basics7m
Thank you4s
1 reading
Cryptographic Weaknesses - SANS Top 2520m

Instructor

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

About IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

About the IT Fundamentals for Cybersecurity Specialization

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.