Coursera
Coursera Logo

IBM - Cybersecurity Roles, Processes & Operating System Security 

  • Offered byCoursera

Cybersecurity Roles, Processes & Operating System Security
 at 
Coursera 
Overview

Duration

15 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Cybersecurity Roles, Processes & Operating System Security
 at 
Coursera 
Highlights

  • Earn a shareable certificate upon completion.
  • Flexible deadlines according to your schedule.
Details Icon

Cybersecurity Roles, Processes & Operating System Security
 at 
Coursera 
Course details

More about this course
  • This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn:
  • ? Understand the key cybersecurity roles within an Organization.
  • ? List key cybersecurity processes and an example of each process.
  • ? Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile.
  • ? Understand the concept of Virtualization as it relates to cybersecurity
  • Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.
  • This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.
  • The completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-roles-processes-operating-system-security
Read more

Cybersecurity Roles, Processes & Operating System Security
 at 
Coursera 
Curriculum

People Process & Technology

Welcome to People, Process and Operating System Fundamentals for Cybersecurity

Overview of People, Process and Technologies

What is IT Security?

Frameworks and their purpose

Roles in Security

Introduction to Process

Business Process Management Overview

Information Technology Infrastructure Library (ITIL) Overview

Key ITIL Processes

Earn an IBM digital badge

Your Subject Matter Experts

ITIL framework

What is IT Service Management?

Welcome to People, Process and Operating System Fundamentals for Cybersecurity

Frameworks, Policies and Roles

Business Process Management and IT Infrastructure Library Basics

People, Process and Technology

Examples & Principles of the CIA Triad

Introduction to the CIA Triad module

Who are Alice, Bob and Trudy?

Confidentiality, Integrity and Availability

Authenticity and Accountability

Priscilla Mariel Guzman Angulo - What's important for my job.

Threat Horizon 2019: Disruption. Distortion. Deterioration

Further discussion of confidentiality, integrity and availability

Principles of the CIA Triad

Introduction to Authentication and Access Control

Identification and AAA

Access Control Methods

Access Control - Physical and Logical

Open Web Application Security Project (OWASP)

OWASP Top 10 Project

What is AAA?

Access Control

Authentication and Access control

Windows Operating System Security Basics

Welcome to operating system fundamentals

User and Kernel Mode

File Systems

Directory Structure

Shortcuts and Commands

Additional Shortcuts

User and Kernel Modes

File Systems and Directory Structure

Shortcuts and Commands

Windows Operating System Security Basics

Key Components

File Systems

Basic Commands

Permissions and Owners

Pentestmonkey research

Key Components

File systems

Linux Basic Commands

Linux Operating System security basics

macOS Auditing

macOS Security Settings

macOS Recovery

macOS Developer resources

macOS Resources Knowledge Check

Overview of Virtualization

Virtualization module introduction

An Overview of Virtualization

Virtualization to Cloud

What is Cloud Computing?

Cloud Benefits, Security and Governance

Wrap up

SANS Institute research exercise

Differences between virtualization and cloud - RedHat

Virtualization Basics and Cloud Computing

Virtualization Basics

Cybersecurity Roles, Processes & Operating System Security
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon

    Cybersecurity Roles, Processes & Operating System Security
     at 
    Coursera 
    Students Ratings & Reviews

    5/5
    Verified Icon1 Rating
    K
    Kavya
    Cybersecurity Roles, Processes & Operating System Security
    Offered by Coursera
    5
    Learning Experience: Industrial knowledge for the role of cyber security
    Faculty: Faculty was quite knowledgeable Curriculum was relevant and comprehensive
    Course Support: Career support was helpful
    Reviewed on 26 Mar 2022Read More
    Thumbs Up IconThumbs Down Icon
    View 1 ReviewRight Arrow Icon
    qna

    Cybersecurity Roles, Processes & Operating System Security
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...