About this Course

102,339 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 29 hours to complete
English

Skills you will gain

Application Securitythreat intelligencenetwork defensive tacticssecurity analystCybersecurity
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 29 hours to complete
English

Offered by

Placeholder

IBM

Syllabus - What you will learn from this course

Content RatingThumbs Up91%(1,279 ratings)Info
Week
1

Week 1

3 hours to complete

Threat Intelligence

3 hours to complete
5 videos (Total 40 min), 1 reading, 3 quizzes
5 videos
Threat Intelligence Strategy and External Sources7m
Threat Intelligence Platforms10m
Threat Intelligence Frameworks9m
Security Intelligence5m
1 reading
Threat Intelligence Sources1h
3 practice exercises
Threat Intelligence and Cybersecurity Knowledge Check20m
Threat Intelligence Framework Knowledge Check15m
Threat Intelligence Graded Assessment30m
Week
2

Week 2

7 hours to complete

Data Loss Prevention and Mobile Endpoint Protection

7 hours to complete
8 videos (Total 78 min), 2 readings, 3 quizzes
8 videos
Data Security Top Challenges9m
Data Security Common Pitfalls9m
Industry Specific Data Security Challenges8m
Capabilities of Data Protection8m
Critical Data Protection Capabilities10m
Data Protection - Industry Example8m
Mobile Endpoint Protection12m
2 readings
Apply Data Protection2h
Apply Mobile Endpoint Protection2h
3 practice exercises
Data Security and Protection Knowledge Check30m
Mobile Endpoint Protection Knowledge Check10m
Data Loss Prevention and Mobile Endpoint Protection Graded Assessment40m
Week
3

Week 3

2 hours to complete

Scanning

2 hours to complete
3 videos (Total 24 min), 1 reading, 4 quizzes
3 videos
Port Scanning6m
Network Protocol Analyzers Overview5m
1 reading
OWASP Vulnerability Tools Listing20m
4 practice exercises
Vulnerability Tools Knowledge Check20m
Port Scanning Knowledge Check10m
Network Protocol Analyzers Knowledge Check5m
Vulnerability Assessment Tools Graded Assessment30m
4 hours to complete

Application Security and Testing

4 hours to complete
12 videos (Total 97 min), 1 reading, 5 quizzes
12 videos
High-level Architectural Models6m
Solutions Architecture5m
Security Patterns2m
Application Security Overview8m
Application Security Threats and Attacks9m
Application Security Standards and Regulations9m
DevSecOps Overview8m
DevSecOps Deployment4m
Application Security Defects - Writing Secure Code12m
Cross-Site Scripting - Common Attacks9m
Cross-Site Scripting - Effective Defenses11m
1 reading
Agile Manifesto5m
5 practice exercises
Security Architecture Considerations Knowledge Check20m
Application Security Techniques and Risks Knowledge Check30m
DevSecOps & Security Automation Knowledge Check10m
Deep Dive into Cross-Scripting Knowledge Check15m
Application Testing Graded Assessment1h 10m
Week
4

Week 4

10 hours to complete

SIEM Platforms

10 hours to complete
7 videos (Total 62 min), 5 readings, 3 quizzes
7 videos
SIEM Deployment10m
SIEM Solutions - Vendors12m
QRadar SIEM - An Industry Example6m
User Behavior Analytics11m
AI and SIEM4m
AI and SIEM - An Industry Example3m
5 readings
Applying SIEM concepts4h
Applying User Behavior Analytics1h
AI and Cybersecurity20m
Applying Artificial Intelligence to SIEM2h
Want to learn more about Cybersecurity and AI?1h
3 practice exercises
SIEM Concepts Knowledge Check15m
Artificial Intelligence in SIEMs Knowledge Check10m
SIEM Platforms Graded Assessment20m

Reviews

TOP REVIEWS FROM CYBER THREAT INTELLIGENCE

View all reviews

Frequently Asked Questions

More questions? Visit the Learner Help Center.