• Length:
    4 Weeks
  • Effort:
    4–8 hours per week
  • Price:

    FREE
    Add a Verified Certificate for $149 USD

  • Institution
  • Subject:
  • Level:
    Introductory
  • Language:
    English
  • Video Transcript:
    English
  • Course Type:
    Self-paced on your time

Associated Programs:

Prerequisites

None

About this course

Skip About this course

This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity exploring motives of cyber attacks to further your knowledge of current cyber threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field.

You will learn about critical thinking and its importance to anyone looking to pursue a career in Cybersecurity.

Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.

What you'll learn

Skip What you'll learn
  • Define cybersecurity and describe key terms
  • Describe how penetration testing is used in cybersecurity
  • Explain the role of cryptography in cybersecurity and how it is used.
  • Describe the purpose, function and types of firewalls
  • Describe the CIA triad and what is meant by confidentiality, integrity and availability.
  • Describe social engineering and how it is used in phishing and vishing attacks.
  • Describe the different types of cybersecurity attack models.
  • Describe why critical thinking is such an important skill for a cybersecurity professional.

Module 1: History of Cybersecurity

This module will give you a brief overview of the history of cybersecurity. You will also learn key terms and roles in cybersecurity.

Module 2: A brief overview of types of actors and their motives

This module will provide you with a brief overview of types of actors and their motives. You will also understand different types of attacks and their impact on an organization and individuals. You will also learn about tools that are available to you to assist in any cybersecurity investigation.

Module 3: An overview of key security concepts

This module will describe various key security concepts that are important in any cybersecurity position. The CIA Triad will be further explained. You will also begin to learn the significance of incident response and frameworks around cybersecurity. Finally, you will get an overview of IT Governance best practices and compliance.

Module 4: An overview of key security tools.

In this module, you will be introduced to key security tools including firewalls, anti-virus and cryptography. You will explore penetration testing and digital forensics. You will learn where you can get resources on industry and current threats to assist in further research around cybersecurity.

Meet your instructors

Coreen Ryskamp
Program manager with IBM Security Learning Services
IBM

Pursue a Verified Certificate to highlight the knowledge and skills you gain
$149 USD

View a PDF of a sample edX certificate
  • Official and Verified

    Receive an instructor-signed certificate with the institution's logo to verify your achievement and increase your job prospects

  • Easily Shareable

    Add the certificate to your CV or resume, or post it directly on LinkedIn

  • Proven Motivator

    Give yourself an additional incentive to complete the course

  • Support our Mission

    edX, a non-profit, relies on verified certificates to help fund free education for everyone globally