About this Course
31,711 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 10 hours to complete

Suggested: 16 hours/week...

English

Subtitles: English

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 10 hours to complete

Suggested: 16 hours/week...

English

Subtitles: English

Learners taking this Course are

  • Security Engineers
  • Technical Solutions Engineers
  • IT Support
  • Machine Learning Engineers
  • Technical Support Associates

Syllabus - What you will learn from this course

Week
1
2 hours to complete

People Process & Technology

9 videos (Total 48 min), 4 readings, 4 quizzes
9 videos
Overview of People, Process and Technologies1m
What is IT Security?42s
Frameworks and their purpose4m
Roles in Security4m
Introduction to Process4m
Business Process Management Overview14m
Information Technology Infrastructure Library (ITIL) Overview9m
Key ITIL Processes6m
4 readings
Earn an IBM digital badge5m
Your Subject Matter Experts10m
ITIL framework30m
What is IT Service Management?15m
4 practice exercises
Welcome to People, Process and Operating System Fundamentals for Cybersecurity4m
Frameworks, Policies and Roles4m
Business Process Management and IT Infrastructure Library Basics8m
People, Process and Technology20m
Week
2
2 hours to complete

Examples & Principles of the CIA Triad

5 videos (Total 16 min), 1 reading, 2 quizzes
5 videos
Who are Alice, Bob and Trudy?3m
Confidentiality, Integrity and Availability9m
Authenticity and Accountability1m
Priscilla Mariel Guzman Angulo - What's important for my job.1m
1 reading
Threat Horizon 2019: Disruption. Distortion. Deterioration1h
2 practice exercises
Further discussion of confidentiality, integrity and availability6m
Principles of the CIA Triad10m
1 hour to complete

Authentication and Access Control

5 videos (Total 23 min), 1 reading, 3 quizzes
5 videos
Identification and AAA7m
Access Control Methods3m
Access Control - Physical and Logical6m
Open Web Application Security Project (OWASP)3m
1 reading
OWASP Top 10 Project20m
3 practice exercises
What is AAA?4m
Access Control4m
Authentication and Access control15m
Week
3
1 hour to complete

Windows Operating System Security Basics

6 videos (Total 28 min), 4 quizzes
6 videos
User and Kernel Mode4m
File Systems3m
Directory Structure6m
Shortcuts and Commands5m
Additional Shortcuts6m
4 practice exercises
User and Kernel Modes2m
File Systems and Directory Structure4m
Shortcuts and Commands4m
Windows Operating System Security Basics20m
1 hour to complete

Linux Operating System Security Basics

4 videos (Total 21 min), 1 reading, 4 quizzes
4 videos
File Systems6m
Basic Commands5m
Permissions and Owners6m
1 reading
Pentestmonkey research20m
4 practice exercises
Key Components2m
File systems2m
Linux Basic Commands4m
Linux Operating System security basics20m
1 hour to complete

macOS Security Basics

1 video (Total 1 min), 1 reading
1 reading
macOS Developer resources45m
Week
4
1 hour to complete

Overview of Virtualization

6 videos (Total 30 min), 2 readings, 2 quizzes
6 videos
An Overview of Virtualization3m
Virtualization to Cloud4m
What is Cloud Computing?12m
Cloud Benefits, Security and Governance7m
Wrap up20s
2 readings
SANS Institute research exercise3m
Differences between virtualization and cloud - RedHat20m
2 practice exercises
Virtualization Basics and Cloud Computing12m
Virtualization Basics15m
4.5
17 ReviewsChevron Right

Top reviews from Cybersecurity Roles, Processes & Operating System Security

By AMOct 28th 2019

Course material was very helpful. However, it would have been nice if the contents was cross referenced with the videos for language and comprehension.

By LSOct 9th 2019

At first i was hating this course design but now..its really great only what we need pay attention on videos and make notes.

Instructor

IBM Security Learning Services

IBM Global Subject Matter Experts
IBM Security

About IBM

IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected. IBM invests more than $6 billion a year in R&D, just completing its 21st year of patent leadership. IBM Research has received recognition beyond any commercial technology research organization and is home to 5 Nobel Laureates, 9 US National Medals of Technology, 5 US National Medals of Science, 6 Turing Awards, and 10 Inductees in US Inventors Hall of Fame....

About the IT Fundamentals for Cybersecurity Specialization

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. This specialization will provide you with the basics you need to get started. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. This specialization is truly an international offering from IBM with experts from the United States, Costa Rica, Canada and Italy. These instructors are architects, Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM. They will share their skills which they need to secure IBM and its clients security systems. The completion of this specialization also makes you eligible to earn the IT Fundamentals for Cybersecurity IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-it-fundamentals-specialist...
IT Fundamentals for Cybersecurity

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • You will receive an email notification from Credly Acclaim with instructions for claiming the badge.  Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.  

More questions? Visit the Learner Help Center.