IBM - Cybersecurity Roles, Processes & Operating System Security
- Offered byCoursera
Cybersecurity Roles, Processes & Operating System Security at Coursera Overview
Duration | 15 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cybersecurity Roles, Processes & Operating System Security at Coursera Highlights
- Earn a shareable certificate upon completion.
- Flexible deadlines according to your schedule.
Cybersecurity Roles, Processes & Operating System Security at Coursera Course details
- This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn:
- ? Understand the key cybersecurity roles within an Organization.
- ? List key cybersecurity processes and an example of each process.
- ? Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile.
- ? Understand the concept of Virtualization as it relates to cybersecurity
- Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.
- This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.
- The completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-roles-processes-operating-system-security
Cybersecurity Roles, Processes & Operating System Security at Coursera Curriculum
People Process & Technology
Welcome to People, Process and Operating System Fundamentals for Cybersecurity
Overview of People, Process and Technologies
What is IT Security?
Frameworks and their purpose
Roles in Security
Introduction to Process
Business Process Management Overview
Information Technology Infrastructure Library (ITIL) Overview
Key ITIL Processes
Earn an IBM digital badge
Your Subject Matter Experts
ITIL framework
What is IT Service Management?
Welcome to People, Process and Operating System Fundamentals for Cybersecurity
Frameworks, Policies and Roles
Business Process Management and IT Infrastructure Library Basics
People, Process and Technology
Examples & Principles of the CIA Triad
Introduction to the CIA Triad module
Who are Alice, Bob and Trudy?
Confidentiality, Integrity and Availability
Authenticity and Accountability
Priscilla Mariel Guzman Angulo - What's important for my job.
Threat Horizon 2019: Disruption. Distortion. Deterioration
Further discussion of confidentiality, integrity and availability
Principles of the CIA Triad
Introduction to Authentication and Access Control
Identification and AAA
Access Control Methods
Access Control - Physical and Logical
Open Web Application Security Project (OWASP)
OWASP Top 10 Project
What is AAA?
Access Control
Authentication and Access control
Windows Operating System Security Basics
Welcome to operating system fundamentals
User and Kernel Mode
File Systems
Directory Structure
Shortcuts and Commands
Additional Shortcuts
User and Kernel Modes
File Systems and Directory Structure
Shortcuts and Commands
Windows Operating System Security Basics
Key Components
File Systems
Basic Commands
Permissions and Owners
Pentestmonkey research
Key Components
File systems
Linux Basic Commands
Linux Operating System security basics
macOS Auditing
macOS Security Settings
macOS Recovery
macOS Developer resources
macOS Resources Knowledge Check
Overview of Virtualization
Virtualization module introduction
An Overview of Virtualization
Virtualization to Cloud
What is Cloud Computing?
Cloud Benefits, Security and Governance
Wrap up
SANS Institute research exercise
Differences between virtualization and cloud - RedHat
Virtualization Basics and Cloud Computing
Virtualization Basics
Cybersecurity Roles, Processes & Operating System Security at Coursera Admission Process
Important Dates
Other courses offered by Coursera
Cybersecurity Roles, Processes & Operating System Security at Coursera Students Ratings & Reviews
- 4-51