Introduction to Cybersecurity Tools & Cyber AttacksAbout this CourseThis course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field.You will learn about critical thinking and its importance to anyone looking to pursue a career in Cybersecurity.Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the first course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.The completion of this course also makes you eligible to earn the Introduction to Cybersecurity Tools & Cyber Attacks IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/introduction-to-cybersecurity-tools-cyber-attacksWHAT YOU WILL LEARNDiscuss the evolution of security based on historical eventsDescribe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.List various types of malicious software.Identify key cybersecurity tools which include the following: firewall, anti-virus, cryptography, penetration testing and digital forensics.SKILLS YOU WILL GAIN Information Security (INFOSEC) IBM New Collar Malware Cyber Attacks CybersecurityInstructorIBM is a global company with subject matter experts in a range of job roles. The material in this course is taught by subject matter experts that are assisting our clients every day in the field at their locations, as ethical hackers and penetration testers as well as in our Security Operation Centers. These subject matter experts (SMEs) are from the United States, Costa Rica, Italy, Canada and the UK.Syllabus – What you will learn from this courseWeek 1History of CybersecurityThis module will give you a brief overview of the history of cybersecurity. You will also learn key terms and roles in cybersecurity.17 videosIntroduction to Cybersecurity Tools & Cyber Attacks – 7mWelcome to History of Cybersecurity1mCybersecurity Definition – 3mKey Terms – 1mSecurity Threats – 2mVulnerability Assessments – 2mRoles in Security – 4mFrom Ronald Reagan/War Games to where we are Today – 4mThe Impact of 9/11 on Cybersecurity – 10mCybersecurity Today – 7mCybersecurity Introduction – 7mThings to consider when starting aCybersecurity program – 1mWhat is Security? – 8mAdditional Security Challenges9mBeyond Technology: Critical Thinking inCybersecurity – 4mCritical Thinking: A Model – 8mCritical Thinking – 5 Key Skills – 16m9 readingsEarn an IBM digital badge – 5mYour IBM Global Subject Matter Experts – 10mThe Insane Amounts of Data We’re Using Every Minute (Infographic) – 10mWiCys Organization Resources – 15mThe SANS Institute – 1mOWASP – The Open Web Application Project – 1mISSA – Information Systems Security Association – 1mFIRST- Forum of Incident Response and Security Teams – 10mAdditional Cybersecurity Industry Associations – 25m7 practice exercisesIntroduction to Cybersecurity Tools & Cyber Attacks – 30mWhat are We Talking about when We Talk about Cybersecurity? – 20mFrom Ronald Reagan to Where we are Today – 10mCybersecurity Programs – 10mCybersecurity – A Security Architect’s Perspective – 15mWhat is Critical Thinking? – 30mHistory of Cybersecurity – 30mWeek 2A brief overview of types of actors and their motivesThis module will provide you with a brief overview of types of actors and their motives. You will also understand different types of attacks and their impact on an organization and individuals. You will also learn about tools that are available to you to assist in any cybersecurity investigation.27 videosWelcome to Security Attacks, Actors and their Motive – 50sA brief overview of types of actors and their motives – 5mHacking organizations – 3mMajor different types of cyber attacks – 6mSecurity Attack Definition – 7mSecurity services – 11mSecurity Mechanisms – 6mNetwork Security Model – 8mOrganizational Threats – 6mAttacks – 6mSecurity Architecture Attacks – 3mSecurity Architecture -Attack models – 8mMalware and Ransomware – 3mThreat Examples – 1mThreat Protection Defined – 2mInternet Security Threats – Mapping – 2mInternet Security Threats – Packet Sniffing – 2mSecurity Threat – IP Spoofing – 1mSecurity Threats – Denial of service – 2mSecurity Attacks – Host insertions – 3mThe Cyber Kill Chain – 5mWhat is Social Engineering? – 4mSocial Engineering – Phishing and Vishing – 3mCyberwarfare – 6mCybercrime Resources – 4mX-Force Command Center Introduction – 2mJavier’s perspective on Cybersecurity Skills 1m2 readings2019 Ponemon Institute Study on the Cyber Resilient Organization – 10mX-Force Research – 20m7 practice exercisesTypes of Actors and their Motives – 30mAn Architect’s perspective on attack classifications – 20mMalware and an introduction to threat protection – – 30mAdditional Attack examples today – 30mAttacks and Cyber resources – 10mA day in the life of a SOC analyst – 30mA brief overview of types of actors and their motives – 50mWeek 3An overview of key security conceptsThis module will describe various key security concepts that are important in any cybersecurity position. The CIA Triad will be further explained. You will also begin to learn the significance of incident response and frameworks around cybersecurity. Finally, you will get an overview of IT Governance best practices and compliance.14 videosWelcome to an Overview of Key Security Concepts – 41sCIA Triad – Confidentiality – 2mCIA Triad – Integrity – 6mCIA Triad – Availability – 3mNon – Repudiation – How does it apply to CIA?- 2mAccess Management – 4mIncident Response – 5mKey Concepts – Incident Response – 7mIncident Response Process – 7mIntroduction to Frameworks and Best Practices – 4mIT Governance Process – 5mCybersecurity Compliance and Audit Overview – 7mPentest Process and Mile 2 CPTE Training5m OWASP framework – 2m4 readingsOWASP Top 10 Project Findings 2021 – 15mNational Institute of Standards & Technology – 15mNational Initiative For Cybersecurity Education – 15mComputer Security Incident Handling Guide – 20m5 practice exercisesCIA Triad – 30mAccess Management – 30mIncident Response – 30mFrameworks and their purpose – 30mQuiz: Key concepts – 35mWeek 4An overview of key security toolsIn this module, you will be introduced to key security tools including firewalls, anti-virus and cryptography. You will explore penetration testing and digital forensics. You will learn where you can get resources on industry and current threats to assist in further research around cybersecurity.16 videosWelcome to an Introduction to Key Security Tools – 51sIntroduction to Firewalls – 2mFirewalls – Packet Filtering – 2mFirewalls – Application Gateway – 4mFirewalls – XML Gateway – 2mFirewalls – Stateless and Stateful – 3mAntivirus/Antimalware – 1mAn introduction of Cryptography – 5mTypes of Cryptography – 5mCryptographic Attacks – 2mCryptography – a different perspective from a Security architect – 14mPenetration Testing Introduction – 6mPentest Methodologies – 9mVulnerability Tests – 4mWhat is Digital Forensics? – 4mConclusion – 24s2 readingsSecurityintelligence.com – 25mIncident Response and Digital Forensics: Will You Buy or Build? – 10m5 practice exercisesFirewalls – 30mAntivirus/Antimalware – 5mIntroduction to Cryptography – 12mFirst look at Penetration Testing and Digital Forensics – 30mKey security tools – 25mDelivery Method– After your purchase, you’ll see a View your orders link which goes to the Downloads page. Here, you can download all the files associated with your order.– Downloads are available once your payment is confirmed, we’ll also send you a download notification email separate from any transaction notification emails you receive from esy[GB].– Since it is a digital copy, our suggestion is to download and save it to your hard drive. In case the link is broken for any reason, please contact us and we will resend the new download link.– If you cannot find the download link, please don’t worry about that. We will update and notify you as soon as possible at 8:00 AM – 8:00 PM (UTC+8).Thank You For Shopping With Us!