IBM - Cyber Threat Intelligence
- Offered byCoursera
Cyber Threat Intelligence at Coursera Overview
Duration | 29 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cyber Threat Intelligence at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 29 hours to complete
- English Subtitles: Arabic, French, Portuguese (European), Italian, Vietnamese, German, Russian, English, Spanish
Cyber Threat Intelligence at Coursera Course details
- This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program.
- You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms.
- This course also gives you hands on access to cybersecurity tools important to a system analyst.
- This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the sixth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.
- The completion of this course also makes you eligible to earn the Cyber Threat Intelligence IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cyber-threat-intelligence.
- In this course, you will learn to:
- ? Describe examples of network defensive tactics.
- ? Discuss data loss prevention and endpoint protection concepts and tools.
- ? Explore a data loss prevention tool and learn how to classify data in your database environment.
- ? Describe security vulnerability scanning technologies and tools.
- ? Recognize application security threats and common vulnerabilities.
- ? Identify the key concepts around threat intelligence.
- ? Explore a SIEM product and review suspicious alerts and how to take action.
- This course is part of multiple programs
- This course can be applied to multiple Specializations or Professional Certificates programs. Completing this course will count towards your learning in any of the following programs:
- Security Analyst Fundamentals Specialization
- IBM Cybersecurity Analyst Professional Certificate
Cyber Threat Intelligence at Coursera Curriculum
Threat Intelligence
Threat Intelligence Overview
Threat Intelligence Strategy and External Sources
Threat Intelligence Platforms
Threat Intelligence Frameworks
Security Intelligence
Threat Intelligence Sources
Threat Intelligence and Cybersecurity Knowledge Check
Threat Intelligence Framework Knowledge Check
Threat Intelligence Graded Assessment
Data Loss Prevention and Mobile Endpoint Protection
What is Data Security and Protection
Data Security Top Challenges
Data Security Common Pitfalls
Industry Specific Data Security Challenges
Capabilities of Data Protection
Critical Data Protection Capabilities
Data Protection - Industry Example
Mobile Endpoint Protection
Apply Data Protection
Apply Mobile Endpoint Protection
Data Security and Protection Knowledge Check
Mobile Endpoint Protection Knowledge Check
Data Loss Prevention and Mobile Endpoint Protection Graded Assessment
Scanning
Vulnerability Assessment Tools
Port Scanning
Network Protocol Analyzers Overview
OWASP Vulnerability Tools Listing
Vulnerability Tools Knowledge Check
Port Scanning Knowledge Check
Network Protocol Analyzers Knowledge Check
Vulnerability Assessment Tools Graded Assessment
Characteristics of a Security Architecture
High-level Architectural Models
Solutions Architecture
Security Patterns
Application Security Overview
Application Security Threats and Attacks
Application Security Standards and Regulations
DevSecOps Overview
DevSecOps Deployment
Application Security Defects - Writing Secure Code
Cross-Site Scripting - Common Attacks
Cross-Site Scripting - Effective Defenses
Agile Manifesto
Security Architecture Considerations Knowledge Check
Application Security Techniques and Risks Knowledge Check
DevSecOps & Security Automation Knowledge Check
Deep Dive into Cross-Scripting Knowledge Check
Application Testing Graded Assessment
SIEM Platforms
SIEM Concepts and Benefits
SIEM Deployment
SIEM Solutions - Vendors
QRadar SIEM - An Industry Example
User Behavior Analytics
AI and SIEM
AI and SIEM - An Industry Example
Applying SIEM concepts
Applying User Behavior Analytics
AI and Cybersecurity
Applying Artificial Intelligence to SIEM
Want to learn more about Cybersecurity and AI?
SIEM Concepts Knowledge Check
Artificial Intelligence in SIEMs Knowledge Check
SIEM Platforms Graded Assessment
Threat Hunting
Fight and Mitigate Upcoming Future Attacks with Cyber Threat Hunting
SOC Cyber Threat Hunting
Cyber Threat Hunting ? An Industry Example
Apply your knowledge of Threat Hunting
Cybersecurity OPS Terminal: A Cyber Breach Game Experience
Threat Hunting Overview Knowledge Check
Threat Hunting Graded Assignment