IBM
Introduction to Cybersecurity Tools & Cyberattacks
IBM

Introduction to Cybersecurity Tools & Cyberattacks

This course is part of multiple programs.

Sponsored by Barbados NTI

447,930 already enrolled

Gain insight into a topic and learn the fundamentals.
4.6

(15,520 reviews)

Beginner level

Recommended experience

Flexible schedule
Approx. 11 hours
Learn at your own pace
92%
Most learners liked this course
Gain insight into a topic and learn the fundamentals.
4.6

(15,520 reviews)

Beginner level

Recommended experience

Flexible schedule
Approx. 11 hours
Learn at your own pace
92%
Most learners liked this course

What you'll learn

  • How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets

  • How to recognize various types of threat actors and malware and explore preventive measures

  • To identify various internet security threats and common cybersecurity best practices

  • To understand authentication and identity management concepts for safeguarding your organization

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

13 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is available as part of
When you enroll in this course, you'll also be asked to select a specific program.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 5 modules in this course

In this module, you'll receive a concise overview detailing the history of cybersecurity, along with insights into key events that influenced the global approach to cybersecurity. You’ll learn about critical thinking, its significance, and how it applies in real-world scenarios within cybersecurity. Additionally, you’ll gain a clear understanding of the five key elements of the critical thinking model. Finally, you will delve into the five critical thinking skills that help form the foundation of critical thinking in every professional field, including cybersecurity.

What's included

7 videos1 reading3 assignments1 discussion prompt5 plugins

In this module, you will discover various threat actors and their motivations, and explore the trends highlighted in the latest IBM Security X-Force Threat Intelligence Index. You will also explore emerging trends in cybersecurity. Additionally, you will study malware and ransomware tactics, along with strategies to protect your system against them. The module will also introduce social engineering and its applications by cybercriminals. Finally, you will identify essential tips to safeguard your system against phishing, vishing, and smishing attempts.

What's included

8 videos4 assignments1 app item8 plugins

In this module, you will learn about a range of internet security threats, including network mapping, packet sniffing, ID spoofing, denial-of-service (DoS) attacks, and injection attacks. You'll also gain insights into system, network, and application security, and engage in practical exercises to implement security controls. Furthermore, you'll delve into vulnerability assessment, incident response, and digital forensics.

What's included

11 videos1 reading3 assignments3 plugins

In this module, you will learn about identity and access management (IAM) and its four main categories. You will explore various authentication protocols and methods to verify an individual's identity and gain a clear understanding of different access control schemes. Additionally, you will compare traditional and innovative access control methods and explore multifactor authentication, single sign-on, and passkeys. Finally, you will learn about various threats that can impact an organization's cybersecurity and identify different security measures for deterring them.

What's included

8 videos1 reading3 assignments4 plugins

In this module, you will complete a final project on multifactor authentication that will provide you with an opportunity to apply the knowledge and skills acquired in this course. You will also take a graded exam to evaluate your understanding of various cybersecurity tools and attacks.

What's included

1 video2 readings1 app item1 plugin

Instructors

Instructor ratings
4.3 (5,383 ratings)
IBM Skills Network Team
IBM
57 Courses969,348 learners
Dee Dee Collette
IBM
4 Courses502,333 learners

Offered by

IBM

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

Showing 3 of 15520

4.6

15,520 reviews

  • 5 stars

    69.83%

  • 4 stars

    21.37%

  • 3 stars

    5.22%

  • 2 stars

    1.72%

  • 1 star

    1.85%

MS
5

Reviewed on Jul 2, 2024

JD
4

Reviewed on Oct 14, 2021

AG
4

Reviewed on Mar 16, 2022

Recommended if you're interested in Information Technology

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy