Chevron Left
Back to Cybersecurity Capstone: Breach Response Case Studies

Learner Reviews & Feedback for Cybersecurity Capstone: Breach Response Case Studies by IBM

4.8
stars
921 ratings

About the Course

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization. Finally, you will explore the costs of data breaches through research studies and well known breaches. This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the seventh and final course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cybersecurity-breach-case-studies . In this course, you will learn to: ● Apply incident response methodologies. ● Research and describe a watering hole attack. ● Research and describe ransomware threats and the consequences to organization. ● Research and describe 3rd party breaches and how they affect an organization. ● Research and describe the effects of a phishing attack. ● Research and describe a point of sale attack and approximate cost of data breaches. ● Perform a case study on a current cyber attack and breach....

Top reviews

DY

Nov 2, 2021

I find this course to be the most useful in terms of practical application. Some of the previous courses felt a bit bogged down by the technical aspects, but I guess this may be unavoidable.

FB

Oct 27, 2021

The best part of the course is the investigative work though it is an online web research in articles it is done with the vision of the knoweldge acquire through the different courses

Filter by:

76 - 100 of 174 Reviews for Cybersecurity Capstone: Breach Response Case Studies

By Jonathan D M T

Jan 15, 2022

By AHMED T

Jan 14, 2022

By Pham T T

Mar 28, 2022

By Eva G M

Nov 18, 2021

By Bilal A

Nov 4, 2021

By Sergey K

Sep 21, 2021

By Ogiri V O

Jun 27, 2022

By Aryanadi I C

Dec 4, 2021

By Trisha S

Jan 16, 2022

By Abhishake B

Aug 1, 2021

By mohamed a m

Jun 2, 2022

By Nuro T B

Feb 26, 2022

By Gus S

Mar 20, 2022

By Richard K A

Dec 6, 2021

By Andy G

Jul 23, 2021

By Paul R

Jun 3, 2022

By Jimmy M A

Feb 27, 2022

By Ilker A U

Feb 20, 2022

By Nelson A

Sep 23, 2021

By José R

Feb 25, 2022

By Javier N A V

Jan 5, 2022

By Nicolás M

Feb 8, 2021

By Tarun G

Mar 1, 2022

By Md. S I

Nov 4, 2021

By Osas E

May 6, 2022