About this Course

293,085 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 15 hours to complete
English
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 15 hours to complete
English

Offered by

Placeholder

IBM

Syllabus - What you will learn from this course

Content RatingThumbs Up93%(6,054 ratings)Info
Week
1

Week 1

4 hours to complete

People Process & Technology

4 hours to complete
9 videos (Total 48 min), 4 readings, 4 quizzes
9 videos
Overview of People, Process and Technologies1m
What is IT Security?42s
Frameworks and their purpose4m
Roles in Security4m
Introduction to Process4m
Business Process Management Overview14m
Information Technology Infrastructure Library (ITIL) Overview9m
Key ITIL Processes6m
4 readings
Earn an IBM digital badge5m
Your Subject Matter Experts10m
ITIL framework30m
What is IT Service Management?15m
4 practice exercises
Welcome to People, Process and Operating System Fundamentals for Cybersecurity30m
Frameworks, Policies and Roles30m
Business Process Management and IT Infrastructure Library Basics30m
People, Process and Technology20m
Week
2

Week 2

2 hours to complete

Examples & Principles of the CIA Triad

2 hours to complete
5 videos (Total 16 min), 1 reading, 2 quizzes
5 videos
Who are Alice, Bob and Trudy?3m
Confidentiality, Integrity and Availability9m
Authenticity and Accountability1m
Priscilla Mariel Guzman Angulo - What's important for my job.1m
1 reading
Threat Horizon 2019: Disruption. Distortion. Deterioration1h
2 practice exercises
Further discussion of confidentiality, integrity and availability30m
Principles of the CIA Triad10m
2 hours to complete

Authentication and Access Control

2 hours to complete
5 videos (Total 23 min), 1 reading, 3 quizzes
5 videos
Identification and AAA7m
Access Control Methods3m
Access Control - Physical and Logical6m
Open Web Application Security Project (OWASP)3m
1 reading
OWASP Top 10 Project20m
3 practice exercises
What is AAA?30m
Access Control30m
Authentication and Access control15m
Week
3

Week 3

2 hours to complete

Windows Operating System Security Basics

2 hours to complete
6 videos (Total 28 min)
6 videos
User and Kernel Mode4m
File Systems3m
Directory Structure6m
Shortcuts and Commands5m
Additional Shortcuts6m
4 practice exercises
User and Kernel Modes30m
File Systems and Directory Structure30m
Shortcuts and Commands30m
Windows Operating System Security Basics20m
2 hours to complete

Linux Operating System Security Basics

2 hours to complete
4 videos (Total 21 min), 1 reading, 4 quizzes
4 videos
File Systems6m
Basic Commands5m
Permissions and Owners6m
1 reading
Pentestmonkey research20m
4 practice exercises
Key Components30m
File systems30m
Linux Basic Commands4m
Linux Operating System security basics20m
1 hour to complete

macOS Security Basics

1 hour to complete
3 videos (Total 13 min), 1 reading, 1 quiz
3 videos
macOS Security Settings4m
macOS Recovery4m
1 reading
macOS Developer resources45m
1 practice exercise
macOS Resources Knowledge Check6m
Week
4

Week 4

2 hours to complete

Overview of Virtualization

2 hours to complete
6 videos (Total 30 min), 2 readings, 2 quizzes
6 videos
An Overview of Virtualization3m
Virtualization to Cloud4m
What is Cloud Computing?12m
Cloud Benefits, Security and Governance7m
Wrap up20s
2 readings
SANS Institute research exercise20m
Differences between virtualization and cloud - RedHat20m
2 practice exercises
Virtualization Basics and Cloud Computing30m
Virtualization Basics15m

Reviews

TOP REVIEWS FROM CYBERSECURITY ROLES, PROCESSES & OPERATING SYSTEM SECURITY

View all reviews

Frequently Asked Questions

More questions? Visit the Learner Help Center.