Skip to main content

IBM: Basic Network and Database Security

4.3 stars
6 ratings

Build a background needed to understand basic network security and learn how to safeguard your organization from cybersecurity attacks. In addition to network security, you will learn about different types of data including personal sensitive data and safeguarding your organization from a data breach.

Basic Network and Database Security
4 weeks
3–4 hours per week
Self-paced
Progress at your own speed
Free
Optional upgrade available

There is one session available:

11,341 already enrolled! After a course session ends, it will be archivedOpens in a new tab.
Starts Mar 28
Ends Jun 30

About this course

Skip About this course

Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge!

This course gives you the background needed to understand basic types of network security. You will learn about computer networks including Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization and network security controls that guard an organization from cybersecurity attacks.

In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch. You will learn about various security data types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. Ultimately you will learn how to safeguard an organizations sensitive information against data loss from cyberattacks.

This course will give you a basic understanding of network security and sensitive data protection services or as part of the overall Cybersecurity basics professional certificate.

Awards

Basic Network and Database Security

At a glance

  • Language: English
  • Video Transcripts: اَلْعَرَبِيَّةُ, Deutsch, English, Español, Français, हिन्दी, Bahasa Indonesia, Português, Kiswahili, తెలుగు, Türkçe, 中文
  • Associated skills:Network Routing, Vulnerability, Local Area Networks, Computer Networks, Database Security, TCP/IP, Research, Network Security, Security Systems, Cyber Security, Open Systems Interconnection, MongoDB, Information Privacy, SQL Injection

What you'll learn

Skip What you'll learn
  • Understand network basics around the TCP/IP and OSI Models.

  • Describe the differences between IPS and IDS Systems.

  • Discuss Layer 2 and Layer 3 network addressing.

  • Describe how Ethernet networks work.

  • Understand IP addressing, network address translation and packet sniffing.

  • Describe application and transport protocols , UDP and TCP.

  • Describe DNS and DHCP servers.

  • Describe key characteristics of different data types and models.

  • Discuss different data structures.

  • Discuss options for protecting your data.

Module 1: TCP/IP Framework

In this module, you will learn about the TCP/IP Framework, Ethernet and Lan Networks, and the basics around routing and switching. You will also learn about address translation and the basic differences between Intrusion Detection and Intrusion Prevention Systems. Finally, you will learn about network packets.

Module 2: Basics of IP Addressing and the OSI Model

In this module, you will learn the basics of IP Addressing and how it affects the network traffic routing. You will about application and transport protocols. You will learn about firewalls and additional information in regards to Intrusion Detection and Intrusion prevention systems. Finally, you will learn the concepts of high availability and clustering.

Module 3: Introduction to Databases

In this module you will learn to define data source and model types as well as types of data. You will also review how to use best practices to secure your organizations data. Finally, you will get an in depth look at use cases around an example of a Data Protection solution, IBM Security Guardium.

Module 4: Deep Dive - Injection Vulnerability

In this module you will hear an IBM Subject Matter expert discuss the common vulnerability of Injection. You will learn the basics around OS Command Injection and SQL Injection.

Who can take this course?

Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

This course is part of Cybersecurity Analyst Professional Certificate Program

Learn more 
Expert instruction
8 skill-building courses
Self-paced
Progress at your own speed
9 months
3 - 5 hours per week

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.