IBM - Cybersecurity Capstone: Breach Response Case Studies
- Offered byCoursera
Cybersecurity Capstone: Breach Response Case Studies at Coursera Overview
Duration | 16 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cybersecurity Capstone: Breach Response Case Studies at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 16 hours to complete
- English Subtitles: French, Portuguese (European), Russian, English, Spanish
Cybersecurity Capstone: Breach Response Case Studies at Coursera Course details
- This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program.
- You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization.
- Finally, you will explore the costs of data breaches through research studies and well known breaches.
- This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course.
- This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the seventh and final course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.
- The completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cybersecurity-breach-case-studies .
- In this course, you will learn to:
- ? Apply incident response methodologies.
- ? Research and describe a watering hole attack.
- ? Research and describe ransomware threats and the consequences to organization.
- ? Research and describe 3rd party breaches and how they affect an organization.
- ? Research and describe the effects of a phishing attack.
- ? Research and describe a point of sale attack and approximate cost of data breaches.
- ? Perform a case study on a current cyber attack and breach.
- This course is part of multiple programs
- This course can be applied to multiple Specializations or Professional Certificates programs. Completing this course will count towards your learning in any of the following programs:
- Security Analyst Fundamentals Specialization
- IBM Cybersecurity Analyst Professional Certificate
Cybersecurity Capstone: Breach Response Case Studies at Coursera Curriculum
Incident Management Response and Cyberattack Frameworks
NIST Incident Response Lifecycle - Teams
NIST Incident Response Lifecycle
IBM X-Force IRIS Cyberattack Framework
What is a Breach?
Target Attack Timeline
Target Attack Vulnerabilities
Watering Hole Attack
Apply Incident Response
X-Force Command Center
X-Force Threat Intelligence Index 2020
Incident Management Knowledge Check
Cyberattack Frameworks Knowledge Check
Case Studies Knowledge Check
Incident Management Response and Cyberattack Frameworks Graded Assessment
Phishing Scams
Phishing Scams Overview
Phishing Email Study
Impact of Phishing
Phishing Case Study: Google & Facebook
Exploring Steps to Recovery
Can You Spot the Difference?
Introduction to Phishing Scams Knowledge Check
Phishing Case Study Knowledge Check
Phishing Scams Graded Assessment
Point of Sale Breach Overview
PoS Malware
PoS Case Study - Home Depot
PoS Skimming
The Cyber Kill Chain in PoS Breaches
Introduction to Point of Sale Attacks Knowledge Check
PoS Case Study: Home Depot Knowledge Check
Point of Sale Breach Graded Assessment
3rd Party Breach
3rd Party Breach Overview
3rd Party Breach Impacts
3rd Party Breach - Quest Diagnostics
List of 3rd Party Breaches
Breach Plan
Third-Party Breach Knowledge Check
Third-Party Breach Graded Assessment
Ransomware overview
Examples of Ransomware
Ransomware Case Study - City of Atlanta
Emerging Trends in Ransomware
Ransomware of Things
Ransomware Knowledge Check
Ransomware Case Study Knowledge Check
Ransomware Graded Assessment
Apply Your Skill - Data Breaches
Introduction to the Peer-to-Peer Applied Project - Data Breaches