IBM - Cybersecurity Architecture
- Offered byCoursera
Cybersecurity Architecture at Coursera Overview
Duration | 12 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Cybersecurity Architecture at Coursera Highlights
- Earn a certificate from IBM
- Add to your LinkedIn profile
- November 2023
- 10 assignments
Cybersecurity Architecture at Coursera Course details
- What you'll learn
- Describe the five foundational principles of cybersecurity and the Confidentiality, Integrity, and Availability (CIA) triad
- Summarize the different areas that a cybersecurity architect must adopt to develop a secure enterprise solution
- Discuss the different security domains, including IAM, endpoint security, network security, application security, and data security
- Demonstrate your proficiency in recommending methods to improve network security in a given scenario
- In a digital world, data drives the world's economy, and almost all cyberattacks aim at stealing sensitive information or holding data hostage. Did you know that according to a recent IBM study, "the global average cost of a data breach was USD 4.45 million, a 15% increase over 3 years"?
- If you are getting started with a career in cybersecurity or just curious about how cybersecurity works, join us on this five-module course on Cybersecurity Architecture. You will learn from a distinguished IBM cybersecurity engineer who is also an adjunct professor at a local university.
- This course is intended for anyone interested in learning about cybersecurity. The course covers the fundamentals of cybersecurity, including topics like five security principles, CIA triad, Identity and Access Management (IAM), endpoint security, and security domains. Learn about the detection and response concepts and tools. In a nutshell, you will get a holistic view of prevention, detection, and response.
- The course will give you an opportunity to practice some concepts through activities and labs. You will also have an opportunity to test your knowledge through quizzes across different modules! Come, explore cybersecurity!
Cybersecurity Architecture at Coursera Curriculum
Cybersecurity Architecture Overview
Course Introduction
Five Principles to Follow (and One to Avoid)
Fundamentals of Confidentiality, Integrity, and Availability
Roles and Tools
Prerequisites and Course Syllabus
Module 1 Summary: Cybersecurity Architecture Overview
Module 1 Practice Quiz: Cybersecurity Architecture Overview
Module 1 Graded Quiz: Cybersecurity Architecture Overview
Helpful Tips for Course Completion
Reading: Key Takeaways: Five Principles
Reading: How to Implement Least Privilege Security
Activity: Apply the Concept of Least Privilege
Reading: Key Takeaways: CIA Fundamentals
Reading: CIA Triad
Reading: Key Takeaways: Roles and Tools
Reading: NIST Cybersecurity Framework
Module 1 Glossary: Cybersecurity Architecture Overview
Access Management and Endpoint Security
Who Are You? Identity and Access Management Really Wants to Know
Endpoints Are the IT Front Door - Guard Them
Module 2 Summary: Access Management and Endpoint Security
Module 2 Practice Quiz: Access Management and Endpoint Security
Module 2 Graded Quiz: Access Management and Endpoint Security
Reading: Key Takeaways: IAM
Reading: Understanding Multi-Factor Authentication
New Plugin Item
Reading: Key Takeaways: Endpoint Security
Reading: Endpoint Management with IBM
New Plugin Item
Module 2 Glossary: Access Management and Endpoint Security
Network, Application, and Data Security
Network Security
Lab Demo
Application Security
Data Security
Module 3 Summary: Network, Application, and Data Security
Module 3 Practice Quiz: Network, Application, and Data Security
Module 3 Graded Quiz: Network, Application, and Data Security
Reading: Key Takeaways: Network Security
Reading: Securing Network Infrastructure
Hands-on Lab: Secure Network Diagram
Reading: Key Takeaways: Application Security
Reading: Secure Coding Practices
Reading: Key Takeaways: Data Security
Reading: Data Security: Why a Proactive Stance is Best
Reading: Quantum Safe Encryption
Module 3 Glossary: Network, Application, and Data Security
Detection and Response
Detection
Response
Module 4 Summary: Detection and Response
Module 4 Practice Quiz: Detection and Response
Module 4 Graded Quiz: Detection and Response
Reading: Key Takeaways: Detection
Reading: Indicators of Compromise
Reading: Threat Intelligence
Activity: Review Recent Security Threat Reports using X-Force Threat Exchange
Reading: Key Takeaways: Response
Reading: Incident Response Frameworks
New Plugin Item
Reading: Case Study -Stopping Cyberattacks at a Major International Airport
Module 4 Glossary: Detection and Response
Final Project, Exam, and Course Wrap-Up