About this Course

180,965 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 16 hours to complete
English

What you will learn

  • List and describe several key cybersecurity compliance and industry standards including NIST, GDPR, HIPAA, SANS and PCI.

  • Describe an overview of the design, roles and function of server and user administration.

  • Understand the concept of patching and endpoint protection as it relates to client system administration.

  • Define encryption, encoding, hashing and digital certificates as it relates to cryptography

Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 16 hours to complete
English

Offered by

Placeholder

IBM

Syllabus - What you will learn from this course

Content RatingThumbs Up96%(4,209 ratings)Info
Week
1

Week 1

6 hours to complete

Compliance Frameworks and Industry Standards

6 hours to complete
13 videos (Total 61 min), 8 readings, 5 quizzes
13 videos
What will you learn in this module?1m
What Cybersecurity Challenges do Organizations Face?7m
Compliance Basics9m
Overview of US Cybersecurity Federal Law2m
National Institute of Standards and Technology (NIST) Overview1m
General Data Protection Regulation (GDPR) Overview3m
International Organization for Standardization (ISO) 2700x3m
SOC Reports8m
SOC Reports - Auditor Process Overview4m
Health Insurance Portability and Accountability Act (HIPAA)7m
Payment Card Industry Data Security Standard (PCI DSS)6m
Center for Internet Security (CIS) Critical Security Controls4m
8 readings
Earn an IBM digital badge10m
About this course5m
National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls25m
Examples of Current GDPR Intention to Fine15m
American Institute of CPAs (AICPA) Website research40m
HIPAA Cybersecurity guidance15m
Compliance and Industry Standards Summary10m
Center for Internet Security (CIS) Critical Security Controls10m
5 practice exercises
Compliance and Regulations for Cybersecurity30m
System and Organization Controls Report (SOC) Overview30m
Industry Standards30m
CIS Critical Security Controls30m
Compliance Frameworks and Industry Standards25m
Week
2

Week 2

4 hours to complete

Client System Administration, Endpoint Protection and Patching

4 hours to complete
7 videos (Total 38 min), 4 readings, 3 quizzes
7 videos
Client System Administration7m
Endpoint Protection6m
Endpoint Protection and Response4m
Unified Endpoint Management8m
Overview of Patching3m
Windows Patching7m
4 readings
4 Social Engineering Threats to Keep an Eye on — and How to Stop Them20m
Endpoint Protection - Additional Vendor Solutions10m
Unified Endpoint for Dummies50m
Patch Management Best Practices20m
3 practice exercises
Client System Administration and Endpoint Protection30m
Patching30m
Client System Administration, Endpoint Protection and Patching15m
Week
3

Week 3

4 hours to complete

Server and User Administration

4 hours to complete
21 videos (Total 119 min), 3 readings, 3 quizzes
21 videos
User and Kernel Modes4m
Files Systems3m
Directory Structure6m
Role-Based Access Control and Permissions6m
Local User Accounts4m
Windows 10 Security App3m
Features of Active Directory5m
Active Directory Accounts and Security Considerations13m
Overview of Server Management with Windows Admin Center4m
Kerberos Authentication and Logs7m
Windows Auditing Overview6m
Introduction to Linux2m
Linux File Systems and Directory Structure4m
Linux Run Levels2m
Exploring the Shell2m
Linux Internal and External Commands4m
Linux Basic Commands- Part 110m
Linux Basic Commands- Part 25m
Linux Basic Commands Part 310m
Demonstration of Samba Installation and Configuration5m
3 readings
Securing privileged access against Threats10m
Beginning your General Data Protection Regulation (GDPR) Journey for Windows Server35m
CIS Controls Microsoft Windows 10 Cyber Hygiene Guide20m
3 practice exercises
Windows Administration30m
Linux Basics30m
Server and User Administration20m
Week
4

Week 4

3 hours to complete

Cryptography and Compliance Pitfalls

3 hours to complete
13 videos (Total 51 min), 5 readings, 2 quizzes
13 videos
Cryptography- An Introduction3m
Cryptography- the Basics7m
Common Cryptography Pitfalls12m
Encrypting Data at Rest2m
Encrypting Data in Use1m
Encrypting Data in Transit7m
Hashing7m
Digital Signatures1m
Safeguarding Encryption Keys2m
Impact of Quantum Computing2m
Key Takeaways - Cryptography and Encryption1m
Thank you4s
5 readings
Additional Review of Cryptographic exposures20m
Digital Signature reading - National Institute of Standards and Technology (NIST)20m
Additional Quantum Computing Research25m
Cryptographic Weaknesses - SANS Top 2520m
Additional Cryptography and Encryption Examples10m
2 practice exercises
Cryptography Basics8m
Cryptography and Compliance Pitfalls15m

Reviews

TOP REVIEWS FROM CYBERSECURITY COMPLIANCE FRAMEWORK & SYSTEM ADMINISTRATION

View all reviews

Frequently Asked Questions

More questions? Visit the Learner Help Center.