Ir al contenido principal

IBM: Cybersecurity Roles and Operating System Security

4.4 stars
10 ratings

This course gives you the background needed to understand basic Cybersecurity around people. process and technology.

Cybersecurity Roles and Operating System Security
7 semanas
2–4 horas por semana
A tu ritmo
Avanza a tu ritmo
Gratis
Verificación opcional disponible

Hay una sesión disponible:

¡Ya se inscribieron 6,311! Una vez finalizada la sesión del curso, será archivadoAbre en una pestaña nueva.
Comienza el 28 mar
Termina el 30 jun

Sobre este curso

Omitir Sobre este curso

Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge!

No matter if you are new to the cybersecurity field or are looking to change careers, this course will help you understand the roles of system security professionals available within an organization from the chief information security officier (CISO) to security analysts.

You will also discover the processes that are important for a cybersecurity organization to implement.

It is also important as a cybersecurity professional to understand basic commands and operating systems to secure your organization’s computer security systems or communicate with the security professionals responsible for that function in your organization.

Premios

Cybersecurity Roles and Operating System Security

De un vistazo

  • Institución: IBM
  • Tema: Informática
  • Nivel: Introductory
  • Prerrequisitos:
    Ninguno
  • Idioma: English
  • Transcripciones de video: اَلْعَرَبِيَّةُ, Deutsch, English, Español, Français, हिन्दी, Bahasa Indonesia, Português, Kiswahili, తెలుగు, Türkçe, 中文
  • Programas asociados:
  • Habilidades asociadas:Operating Systems, Cyber Security, Computer Security

Lo que aprenderás

Omitir Lo que aprenderás
  • Understand the key cybersecurity roles within an organization.
  • List key cybersecurity processes and an example of each process.
  • Define authentication and access control methods.
  • Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile.
  • Understand the concept of Virtualization as it relates to cybersecurity

Plan de estudios

Omitir Plan de estudios

Module 1: People, process and technology

This module will take you through a typical Security organization. You will also learn about the service management framework and how it affects how an organization will use this framework to avoid or react to cybersecurity attacks. You will also research ITIL standard processes.

Module 2: Examples & Principles of the CIA Triad

This module will explain what is the CIA Triad and how is it important to cybersecurity concepts and practice.

Module 3: Authentication and Access Control

In this module you will learn the importance of authentication and identification. You will also learn how access controls both physical and logical help safeguard an organization. You will also investigate an identified risk around access control.

Module 4: Windows Operating system security basics

In this module you will learn about the file system and directory structures for the Windows operating system. You will also learn about many shortcuts and commands which will help you to navigate the Windows system to gather information and reduce your work time.

Module 5: Linux Operating system security basics

In this module you will learn the key components of the Linux operating system and basic commands required to assist you in accessing information that pertains to the security of your systems. You will also access Pentestmonkey a resource many cybersecurity professionals use to access cheat sheets about certain cybersecurity vulnerabilities and investigations.

Module 6: MacOS system security basics

In this module you will learn how to find resources around MAC/OS. You will read documentation from Apple around the security framework and how to investigate additional information through the eyes of a developer.

Module 7: Overview of Virtualization

In this module, you will learn the basics of virtualization and cloud computing. You will also learn about cloud computing governance, security and benefits.

¿Quién puede hacer este curso?

Lamentablemente, las personas residentes en uno o más de los siguientes países o regiones no podrán registrarse para este curso: Irán, Cuba y la región de Crimea en Ucrania. Si bien edX consiguió licencias de la Oficina de Control de Activos Extranjeros de los EE. UU. (U.S. Office of Foreign Assets Control, OFAC) para ofrecer nuestros cursos a personas en estos países y regiones, las licencias que hemos recibido no son lo suficientemente amplias como para permitirnos dictar este curso en todas las ubicaciones. edX lamenta profundamente que las sanciones estadounidenses impidan que ofrezcamos todos nuestros cursos a cualquier persona, sin importar dónde viva.

Este curso es parte del programa Cybersecurity Analyst Professional Certificate

Más información 
Instrucción por expertos
8 cursos de capacitación
A tu ritmo
Avanza a tu ritmo
9 meses
3 - 5 horas semanales

¿Te interesa este curso para tu negocio o equipo?

Capacita a tus empleados en los temas más solicitados con edX para Negocios.