Coursera
Coursera Logo

IBM - Cyber Threat Intelligence 

  • Offered byCoursera

Cyber Threat Intelligence
 at 
Coursera 
Overview

Duration

29 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Cyber Threat Intelligence
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Beginner Level
  • Approx. 29 hours to complete
  • English Subtitles: Arabic, French, Portuguese (European), Italian, Vietnamese, German, Russian, English, Spanish
Read more
Details Icon

Cyber Threat Intelligence
 at 
Coursera 
Course details

More about this course
  • This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program.
  • You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms.
  • This course also gives you hands on access to cybersecurity tools important to a system analyst.
  • This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the sixth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.
  • The completion of this course also makes you eligible to earn the Cyber Threat Intelligence IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cyber-threat-intelligence.
  • In this course, you will learn to:
  • ? Describe examples of network defensive tactics.
  • ? Discuss data loss prevention and endpoint protection concepts and tools.
  • ? Explore a data loss prevention tool and learn how to classify data in your database environment.
  • ? Describe security vulnerability scanning technologies and tools.
  • ? Recognize application security threats and common vulnerabilities.
  • ? Identify the key concepts around threat intelligence.
  • ? Explore a SIEM product and review suspicious alerts and how to take action.
  • This course is part of multiple programs
  • This course can be applied to multiple Specializations or Professional Certificates programs. Completing this course will count towards your learning in any of the following programs:
  • Security Analyst Fundamentals Specialization
  • IBM Cybersecurity Analyst Professional Certificate
Read more

Cyber Threat Intelligence
 at 
Coursera 
Curriculum

Threat Intelligence

Threat Intelligence Overview

Threat Intelligence Strategy and External Sources

Threat Intelligence Platforms

Threat Intelligence Frameworks

Security Intelligence

Threat Intelligence Sources

Threat Intelligence and Cybersecurity Knowledge Check

Threat Intelligence Framework Knowledge Check

Threat Intelligence Graded Assessment

Data Loss Prevention and Mobile Endpoint Protection

What is Data Security and Protection

Data Security Top Challenges

Data Security Common Pitfalls

Industry Specific Data Security Challenges

Capabilities of Data Protection

Critical Data Protection Capabilities

Data Protection - Industry Example

Mobile Endpoint Protection

Apply Data Protection

Apply Mobile Endpoint Protection

Data Security and Protection Knowledge Check

Mobile Endpoint Protection Knowledge Check

Data Loss Prevention and Mobile Endpoint Protection Graded Assessment

Scanning

Vulnerability Assessment Tools

Port Scanning

Network Protocol Analyzers Overview

OWASP Vulnerability Tools Listing

Vulnerability Tools Knowledge Check

Port Scanning Knowledge Check

Network Protocol Analyzers Knowledge Check

Vulnerability Assessment Tools Graded Assessment

Characteristics of a Security Architecture

High-level Architectural Models

Solutions Architecture

Security Patterns

Application Security Overview

Application Security Threats and Attacks

Application Security Standards and Regulations

DevSecOps Overview

DevSecOps Deployment

Application Security Defects - Writing Secure Code

Cross-Site Scripting - Common Attacks

Cross-Site Scripting - Effective Defenses

Agile Manifesto

Security Architecture Considerations Knowledge Check

Application Security Techniques and Risks Knowledge Check

DevSecOps & Security Automation Knowledge Check

Deep Dive into Cross-Scripting Knowledge Check

Application Testing Graded Assessment

SIEM Platforms

SIEM Concepts and Benefits

SIEM Deployment

SIEM Solutions - Vendors

QRadar SIEM - An Industry Example

User Behavior Analytics

AI and SIEM

AI and SIEM - An Industry Example

Applying SIEM concepts

Applying User Behavior Analytics

AI and Cybersecurity

Applying Artificial Intelligence to SIEM

Want to learn more about Cybersecurity and AI?

SIEM Concepts Knowledge Check

Artificial Intelligence in SIEMs Knowledge Check

SIEM Platforms Graded Assessment

Threat Hunting

Fight and Mitigate Upcoming Future Attacks with Cyber Threat Hunting

SOC Cyber Threat Hunting

Cyber Threat Hunting ? An Industry Example

Apply your knowledge of Threat Hunting

Cybersecurity OPS Terminal: A Cyber Breach Game Experience

Threat Hunting Overview Knowledge Check

Threat Hunting Graded Assignment

Cyber Threat Intelligence
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Cyber Threat Intelligence
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...