About this Course

182,486 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 14 hours to complete
English

What you will learn

  • Understand network basics around the TCP/IP and OSI Models.

  • Recount DNS, DHCP, Switching and Routing concepts.

  • Understand IP Addressing, Network Address Translation and Packet Sniffing.

  • Describe the structures and vulnerabilities of key databases for cybersecurity including SQL, Couch, Oracle and MongoDB.

Skills you will gain

database vulnerabilitiesNetwork SecuritySql InjectionCybersecuritynetworking basics
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 14 hours to complete
English

Offered by

Placeholder

IBM

Syllabus - What you will learn from this course

Content RatingThumbs Up89%(5,454 ratings)Info
Week
1

Week 1

4 hours to complete

TCP/IP Framework

4 hours to complete
16 videos (Total 61 min), 3 readings, 4 quizzes
16 videos
Welcome to Introduction to TCP/IP Framework34s
Stateless Inspection4m
Stateful Inspection4m
Firewall Filters- IDS and IPS Systems5m
The Difference between IDS and IPS Systems2m
Network Address Translation4m
An Introduction to Local Area Networks6m
Ethernet and LAN - Ethernet Operations4m
Ethernet and LAN - Network Devices5m
Introduction to Basic Network Routing53s
Layer 2 and Layer 3 Network Addressing5m
Address Resolution Protocol6m
Routers and Routing Tables, Part 12m
Routers and Routing Tables, Part 21m
Routers and Routing Tables, Part 35m
3 readings
Earn an IBM digital badge10m
About this course5m
Research of Network Vendor Training20m
4 practice exercises
Introduction to the TCP/IP Protocol Framework30m
Network Protocols over Ethernet and Local Area Networks30m
Basics of Routing and Switching, Network Packets and Structures30m
TCP/IP Framework30m
Week
2

Week 2

4 hours to complete

Basics of IP Addressing and the OSI Model

4 hours to complete
16 videos (Total 81 min)
16 videos
IP Addressing - The Basics of Binary8m
IP Address Structure and Network Classes5m
IP Protocol and Traffic Routing6m
Introduction to the IPv6 Address Schema4m
Application and Transport Protocols UDP and TCP, Part 15m
Application and Transport Protocols UDP and TCP, Part 27m
DNS and DHCP5m
Syslog Message Logging Protocol4m
Flows and Network Analysis2m
Port Mirroring and Promiscuous Mode2m
Next Generation Firewalls - Overview4m
NGFW and the OSI Model2m
NGFW Packet Flow Example and NGFW Comparisons6m
Intrusion Detection and Intrusion Prevention Systems5m
High Availability and Clustering9m
6 practice exercises
Basics of IP Addressing30m
TCP/IP Layer 4, Transport Layer Overview30m
TCP/IP Layer 5, Application Layer Overview30m
Firewalls, Intrusion Detection and Intrusion Prevention Systems8m
Clustering and High Availability Systems30m
Basics of IP Addressing and the OSI Model30m
Week
3

Week 3

4 hours to complete

Introduction to Databases

4 hours to complete
18 videos (Total 88 min), 1 reading, 4 quizzes
18 videos
Data Source Types Part 15m
Data Source Types Part 25m
Data Model Types4m
Structured Data7m
Securing the Crown Jewels8m
Leveraging Security Industry Best Practices1m
Structured Data and Relational Databases1m
Anatomy of a Vulnerability Assessment Test Report2m
Securing Data Sources by Type8m
Securing Databases Wrap Up2m
Data Monitoring4m
Data Alerts3m
Data Activity Reporting8m
Attributes to Include in Logging6m
Failed Access Monitoring2m
Suspicious Access Events, Part 14m
Suspicious Access Events, Part 27m
1 reading
Data Breach Feeds25m
4 practice exercises
Types of Data30m
Securing Databases30m
A Data Protection Solution Example, IBM Security Guardium Use Cases30m
Introduction to Databases30m
Week
4

Week 4

2 hours to complete

Deep Dive - Injection Vulnerability

2 hours to complete
9 videos (Total 45 min), 1 reading, 4 quizzes
9 videos
Introduction to Injection Flaws3m
OS Command Injection Part 18m
OS Command Injection Part 25m
OS Command Injection Part 37m
SQL Injection Part 18m
SQL Injection Part 26m
Other Types of Injection4m
Thank you for attending this course18s
1 reading
Additional Resources35m
4 practice exercises
Injection Vulnerability12m
SQL Injection10m
Deep Dive - Injection Vulnerability24m
Opt-in to receive your badge!

Reviews

TOP REVIEWS FROM NETWORK SECURITY & DATABASE VULNERABILITIES

View all reviews

Frequently Asked Questions

More questions? Visit the Learner Help Center.