DL
I thought the course information was good. I do think the transcriptions need a little work to reflect what is actually being said by the instructors.
The US Bureau of Labor Statistics forecasts a 32% growth in information security analyst jobs until 2032. These analysts are in demand as part of the team that keeps networks secure.
This course provides practical hands-on computer networking and network security experience that employers want. Through innovative hands-on labs, you'll learn how to secure a small home office network (SOHO), install and configure DHCP, and filter DNS. You’ll also get real-world practice installing and using an open-source Extended Detection and Response (XDR) system. Additionally, you’ll build valuable supporting knowledge of ports, protocols, and IP addresses, including IPv6 and network routing. You’ll learn about Layer 2 and 3 addressing, routers, and routing tables. Plus, you’ll develop knowledge of cybersecurity analyst tools for data protection, endpoint protection, and SIEM, which you can apply to an organization’s compliance and threat intelligence needs, which is crucial in today’s cybersecurity landscape. You’ll complete a final project where you will demonstrate your ability to perform network and security planning tasks. Networking and network security skills pay. Invest in yourself and enroll today!
DL
I thought the course information was good. I do think the transcriptions need a little work to reflect what is actually being said by the instructors.
MG
Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!
SR
Some of the transcripts are not exactly accurate. Also it would really great if you could cut down some information, making it more concise so that it becomes easy to read and understand
JB
A great review on network infrastructure, while providing security-based content that was relatable to not only the material, but also to current cybersecurity trends.
JF
Up to this point, the Network Security & Database Vulnerabilities course is the most difficult. So much information addressed in some videos - hard to consume all.
AM
Please try to make it more interacting like making sql injection statement by users them self and seeing how the output changes, it would be great if it was there.
TD
the course was excellent. I think I have gained new knowledge and skills in this networking field and waiting to learn even more additional skills in this field.
NK
It's been an great opportunity to study this course and knowing about the industry behind it and Thank you for the lectures for teaching, I had a good time studying.
OA
Great course, meticulous facilitators. Thanks you all. I was once a novice in Cybersecurity but now I am well tutored to take on challenging problems and provide solution.
FC
In general the course was ok.The network explanation and the injection part of the course was very good. A good explanation and presenters which spoke clearly.
AP
good course and help me understanding about network security, i recomend this course to anyone who wants to develop their knowledge about network security.
KH
very good ..network part is little puzzle..very good course for network security and database vulnerabitities.This course gonna give you the confident you need as cyber security analyst.km hasan
Showing: 20 of 729
The sound quality of most lectures is bad. Some lectures seem chaotic/unstructured and not very well prepared. In week three there are two videos of 8 minutes which contain only one slide, which could have been divided into more slides. Some slides have a too small script. One video seems just like an advertisement for one of IBM's software products. Although the instructors are experts in their respective field, they do not seem to have much expertise in giving lectures.
The content is basic overview of network security. I would say that the lecture videos of the first 2 weeks were just 'okay'. But the practice quizes made the content easily understandable.
Great course, meticulous facilitators. Thanks you all. I was once a novice in Cybersecurity but now I am well tutored to take on challenging problems and provide solution.
There's a lot of good information in this course and I did learn a lot, however the presentation is very, very poor. The info in this course deserves a 4 star review, but the audio is absolutely terrible. Also some of the videos have extreme;y poor visuals. This course actually makes IBM look like a company with no quality assurance department.
All chapters are of poor technical quality. Especial the audio quality in close to inaceptable. Some chapters are also of badly presented content. Only two are at least informative. Some refernces are not technically not usable
very good ..network part is little puzzle..very good course for network security and database vulnerabitities.This course gonna give you the confident you need as cyber security analyst.km hasan
I have found this course very useful to understand fundamental of Network Security. Information on Database Vulnerabilities ellobarated very effectively. This course will definatly very useful not only for IT Security developer, but also for application developer who wants to undertand how network security works and how to prevent database vulnerabilities. For additional information, Both topics are mutually exclusive and in course also there is no reference of first two weeks content in next 2 week content or vice-versa. Thanks a lot.
This course gave me great insights into the network security domain while explaining different types of DB vulnerabilities. A quick revision of my Cyber Security and Computer Networks subjects. ;>
the Cybersecurity Fundamentals series course is good for the basic level only.
We need IBM to create a more advance level course in the near future.
This section leaves a little to be desired, as the instructors on a few videos are difficult to understand due to poor recordings. Some of the subject matter presented is gone over too quickly to actually help the student understand.
It was a little difficult to recognize the main point in "A Data Protection Solution Example, IBM Security Gaudium " section. Will be good if you do small refactoring. Dmitriy Beryoza, thank you for the great session.
Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!
The Course was very challenging and the same trends were observed here: Cyber professionals should understand that their student audiences have absolutely no knowledge about computers let alone cyber security. When they understand that, they would explain the key concepts more efficiently. For example, when discussing DHCP, the instructors assume the audience is just refreshing knowledge but that is not the case. The discussions on SQL Injections were also directed at audiences who were wondering on professional wisdom on cyber security practices. But this issue is present in almost all cyber related topics across companies. Please assume the students have no idea about cyber or security or cyber security. Most people hardly even know the difference between Windows and Microsoft Office.
The course was great I very much enjoyed it. The only problem was that in week 3 it was more demo than written side material to support the question that was asked. I had to go back and review every transcription to find supporting answers. All in all, I learn a lot more regard SIEM configuration.
Absolutely recommended to ladies and gentleman who are currently working in network company and wanna upgrade to another POST. This Network Security and Database Vulnerabilities course are definitely the best.
Comprehensive :) Was difficult and I'll need to come back because a lot went over my head, but overall satisfied :)
Audio and subtitles could use some work 😅
good course and help me understanding about network security, i recomend this course to anyone who wants to develop their knowledge about network security.
The presentation you gave was one that I will never ever forget. I can’t thank you enough for that and knowledge sharing.
Thank you very much
coursera
excelente curso, se aprendio bastante aunqie se que redes no es mi fuerte comprendi de la forma mas simple como funciona el modelo OSI y TCP IP
This course was very interesting and I gain a lot on this specialization. I will continue to gain the specialization of Cybersecurity Analyst.