Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Introduction to Cybersecurity Tools & Cyberattacks

IBM via Coursera

Overview

Unlock Unlimited Opportunities: Get 50% Off Your First Month of Coursera Plus
According to a recent IBM report, cyberattacks have surged 71%! This alarming statistic highlights a huge demand for cybersecurity professionals. This IBM course will introduce you to fundamental cybersecurity concepts, threats, and preventive measures to start your cybersecurity journey. In this course, you’ll explore the evolution of cybersecurity and discover the critical thinking model. You’ll also cover threat actors, malware, ransomware, and defenses against social engineering. Additionally, you’ll learn about internet security threats and security controls. You’ll explore the fundamentals of identity and access management (IAM), authentication, and access control. You’ll also look at the physical threats organizations encounter and consider effective security measures. Throughout, you’ll build practical knowledge through hands-on labs and gain technical expertise through insights from industry experts. Your final project will enable you to effectively demonstrate your understanding of cybersecurity principles. This course is for anyone who wants a basic understanding of cybersecurity and is part of a series designed to help you start a career as a Cybersecurity Analyst.

Syllabus

  • Cybersecurity Insights
    • In this module, you'll receive a concise overview detailing the history of cybersecurity, along with insights into key events that influenced the global approach to cybersecurity. You’ll learn about critical thinking, its significance, and how it applies in real-world scenarios within cybersecurity. Additionally, you’ll gain a clear understanding of the five key elements of the critical thinking model. Finally, you will delve into the five critical thinking skills that help form the foundation of critical thinking in every professional field, including cybersecurity.
  • Cybersecurity Threats
    • In this module, you will discover various threat actors and their motivations, and explore the trends highlighted in the latest IBM Security X-Force Threat Intelligence Index. You will also explore emerging trends in cybersecurity. Additionally, you will study malware and ransomware tactics, along with strategies to protect your system against them. The module will also introduce social engineering and its applications by cybercriminals. Finally, you will identify essential tips to safeguard your system against phishing, vishing, and smishing attempts.
  • Cybersecurity Controls
    • In this module, you will learn about a range of internet security threats, including network mapping, packet sniffing, ID spoofing, denial-of-service (DoS) attacks, and injection attacks. You'll also gain insights into system, network, and application security, and engage in practical exercises to implement security controls. Furthermore, you'll delve into vulnerability assessment, incident response, and digital forensics.
  • Identity and Physical Controls
    • In this module, you will learn about identity and access management (IAM) and its four main categories. You will explore various authentication protocols and methods to verify an individual's identity and gain a clear understanding of different access control schemes. Additionally, you will compare traditional and innovative access control methods and explore multifactor authentication, single sign-on, and passkeys. Finally, you will learn about various threats that can impact an organization's cybersecurity and identify different security measures for deterring them.
  • Final Project and Course Wrap-Up
    • In this module, you will complete a final project on multifactor authentication that will provide you with an opportunity to apply the knowledge and skills acquired in this course. You will also take a graded exam to evaluate your understanding of various cybersecurity tools and attacks.

Taught by

IBM Security Learning Services

Reviews

2.5 rating, based on 2 Class Central reviews

4.6 rating at Coursera based on 15343 ratings

Start your review of Introduction to Cybersecurity Tools & Cyberattacks

  • Anonymous
    Really bad course. Instructors have poor grasp of English and cannot explain things well. DO not do this! Not even for the "professional certificate".
  • A good introduction to cybersecurity topics: ranges from history of cybersecurity events, and general types of attack, to penetration testing and firewall as a method to defence against attacks.

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.