Chevron Left
Back to Cybersecurity Roles, Processes & Operating System Security

Learner Reviews & Feedback for Cybersecurity Roles, Processes & Operating System Security by IBM

4.6
stars
5,378 ratings

About the Course

This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: ● Understand the key cybersecurity roles within an Organization. ● List key cybersecurity processes and an example of each process. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile. ● Understand the concept of Virtualization as it relates to cybersecurity Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-roles-processes-operating-system-security...

Top reviews

MG

Apr 24, 2020

Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!

TC

May 10, 2020

Knowledge delivery is exceptional. Content is to the point and the tests really pinpoint the attention level of the volunteer taking the course.Thank you for designing such a knowledgeable course

Filter by:

976 - 1000 of 1,058 Reviews for Cybersecurity Roles, Processes & Operating System Security

By Nicole T

Jan 15, 2021

The closed caption did not match what the speaker was clearly saying.

By Bradley G

Apr 13, 2022

Best part of course was the cloud and virtualisation component.

By sobit t

Jul 4, 2020

Pictures,screenshots and charts used in the course are not clear

By FELIPE-ANTONIO L

Mar 11, 2022

Almost nothing concerning Cybersecurity, just pure Computing.

By Hussain K b

Apr 14, 2024

my name is hussain khaqan babar but it writes hussain baber

By Juan M T

Feb 2, 2022

Videos in low resolution... some text is difficult to read

By Pedro H d F B B

Feb 7, 2021

Some videos are very low resolution and really bad audio.

By George M

Mar 16, 2021

Very basic course.

Good for someone just getting started.

By Ida J

Aug 1, 2022

Some bad photos that was hard to see the text in it.

By Sahak P

Nov 23, 2020

The quality and sound of the videos could be better.

By Vaghela T

May 20, 2020

Content is best. Just need To improve audio quality.

By Abdo M

Jun 25, 2020

not well organized but yet informative so thank you

By Vinicius P

Mar 24, 2023

image of the slides are not the best quality

By Sohn c

Jun 12, 2020

Most of the videos where to blurry to read.

By Navid F R

May 1, 2020

Not detailed and slides are not clear.

By Rob

Oct 11, 2023

Seems like alot of dated information.

By ms g

Sep 21, 2019

More hands-on and labs would be good.

By Nickolay E T

Nov 2, 2020

Voice and video quality is very bad

By Lucky P

Oct 4, 2020

It can be teached in simple way.

By Benamin C

Mar 21, 2021

Audio / Visual quality is poor

By Muhammad H b A G

Nov 26, 2020

Video quality need improvement

By Thi T N P

Oct 16, 2022

Some slides i cannot read it

By eduardo E

Nov 11, 2020

Poor Materials and poor audio

By Md. A H T

Nov 30, 2020

Week 2 and 3 is quite easy.

By Shubham K

Apr 7, 2023

video quality is not good