Ir al contenido principalSkip to Xpert Chatbot

IBM: Beginners Guide to Cybersecurity

4.5 stars
67 ratings

This course is designed for beginners to build critical skills to address common security threats, and adopt best practices for reducing risks.

Beginners Guide to Cybersecurity
4 semanas
3–5 horas por semana
A tu ritmo
Avanza a tu ritmo
Gratis
Verificación opcional disponible

Hay una sesión disponible:

¡Ya se inscribieron 18,042! Una vez finalizada la sesión del curso, será archivadoAbre en una pestaña nueva.
Comienza el 4 nov

Sobre este curso

Omitir Sobre este curso

A tech talent shortage continues as organizations adopt higher security standards to address the ongoing risk of threats and breaches. This course builds key skills to address common security threats and risks and provides best practices to guard against them.

This course is designed for everyone, especially those interested in a Cyber Analyst I or an entry-level Cloud & Security Engineer role, as well as Tech Support. Diving into the world of cybersecurity, you’ll gain critical skills employers need, including identifying security threats, understanding encryption uses, demonstrating safe browsing techniques, implementing email security best practices. and identifying and becoming familiar with various types of cybersecurity risks and threats. This course is ideal for technical support roles, often on the front lines of defense for cybersecurity issues.

De un vistazo

  • Institution IBM
  • Subject Informática
  • Level Introductory
  • Prerequisites

    Basic computer operating skills, including using a web browser.

Lo que aprenderás

Omitir Lo que aprenderás
  • Recognize the importance of data security, maintaining data integrity, and confidentiality.
  • Demonstrate the installation of software updates and patches.
  • Identify preferred practices for authentication, encryption, and device security.
  • Discuss types of security threats, breaches, malware, social engineering, and other attack vectors.

Plan de estudios

Omitir Plan de estudios

Module 1: Common Security Threats and Risks

  • Confidentiality, Integrity, and Availability Concerns
  • Importance of Security and Information Privacy
  • Security Threats and Ways of Breaches
  • Different Types of Security Threats
  • (Optional Activity) Cybersecurity Ops: Terminal

Module 2: Password Management and Security Best Practices

  • Password Management Techniques
  • Authentication, Authorization, and Accounting
  • Ways to Hardening Devices
  • Validation and Device usage
  • Encryption Concepts
  • Emails and Spam Management

Module 3: Security Concerns and Safe Browsing

  • Application Ecosystem Security
  • Public Browsing Risks
  • Browser Security Settings
  • Safe Browsing Techniques
  • Security Threats: Virtual Private Networks

Module 4: Final Exam

¿Quién puede hacer este curso?

Lamentablemente, las personas residentes en uno o más de los siguientes países o regiones no podrán registrarse para este curso: Irán, Cuba y la región de Crimea en Ucrania. Si bien edX consiguió licencias de la Oficina de Control de Activos Extranjeros de los EE. UU. (U.S. Office of Foreign Assets Control, OFAC) para ofrecer nuestros cursos a personas en estos países y regiones, las licencias que hemos recibido no son lo suficientemente amplias como para permitirnos dictar este curso en todas las ubicaciones. edX lamenta profundamente que las sanciones estadounidenses impidan que ofrezcamos todos nuestros cursos a cualquier persona, sin importar dónde viva.

Este curso es parte del programa Information Technology (IT) Support PC Professional Certificate

Más información 
Instrucción por expertos
7 cursos de capacitación
A tu ritmo
Avanza a tu ritmo
8 meses
6 - 8 horas semanales

¿Te interesa este curso para tu negocio o equipo?

Capacita a tus empleados en los temas más solicitados con edX para Negocios.