Skip to main content

IBM: Beginners Guide to Cybersecurity

4.7 stars
11 ratings

This course is designed for beginners to build critical skills to address common security threats, and adopt best practices for reducing risks.

Beginners Guide to Cybersecurity
4 weeks
3–5 hours per week
Progress at your own speed
Optional upgrade available

There is one session available:

11,100 already enrolled! After a course session ends, it will be archivedOpens in a new tab.
Starts Mar 1
Ends Jun 30

About this course

Skip About this course

A tech talent shortage continues as organizations adopt higher security standards to address the ongoing risk of threats and breaches. This course builds key skills to address common security threats and risks and provides best practices to guard against them.

This course is designed for everyone, especially those interested in a Cyber Analyst I or an entry-level Cloud & Security Engineer role, as well as Tech Support. Diving into the world of cybersecurity, you’ll gain critical skills employers need, including identifying security threats, understanding encryption uses, demonstrating safe browsing techniques, implementing email security best practices. and identifying and becoming familiar with various types of cybersecurity risks and threats. This course is ideal for technical support roles, often on the front lines of defense for cybersecurity issues.

At a glance

  • Institution: IBM
  • Subject: Computer Science
  • Level: Introductory
  • Prerequisites:

    Basic computer operating skills, including using a web browser.

  • Language: English
  • Video Transcript: English
  • Associated programs:
  • Associated skills:Encryption, Cyber Security, Technical Support

What you'll learn

Skip What you'll learn
  • Recognize the importance of data security, maintaining data integrity, and confidentiality.
  • Demonstrate the installation of software updates and patches.
  • Identify preferred practices for authentication, encryption, and device security.
  • Discuss types of security threats, breaches, malware, social engineering, and other attack vectors.

Module 1: Common Security Threats and Risks

  • Confidentiality, Integrity, and Availability Concerns
  • Importance of Security and Information Privacy
  • Security Threats and Ways of Breaches
  • Different Types of Security Threats
  • (Optional Activity) Cybersecurity Ops: Terminal

Module 2: Password Management and Security Best Practices

  • Password Management Techniques
  • Authentication, Authorization, and Accounting
  • Ways to Hardening Devices
  • Validation and Device usage
  • Encryption Concepts
  • Emails and Spam Management

Module 3: Security Concerns and Safe Browsing

  • Application Ecosystem Security
  • Public Browsing Risks
  • Browser Security Settings
  • Safe Browsing Techniques
  • Security Threats: Virtual Private Networks

Module 4: Final Exam

Who can take this course?

Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

This course is part of Information Technology (IT) Support PC Professional Certificate Program

Learn more 
Expert instruction
7 skill-building courses
Progress at your own speed
8 months
6 - 8 hours per week

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.