According to a recent IBM report, cyberattacks have surged 71%! This alarming statistic highlights a huge demand for cybersecurity professionals. This IBM course will introduce you to fundamental cybersecurity concepts, threats, and preventive measures to start your cybersecurity journey.
Introduction to Cybersecurity Tools & Cyberattacks
This course is part of multiple programs.
Instructors: IBM Skills Network Team +1 more
452,180 already enrolled
Included with
(15,710 reviews)
Recommended experience
What you'll learn
How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets
How to recognize various types of threat actors and malware and explore preventive measures
To identify various internet security threats and common cybersecurity best practices
To understand authentication and identity management concepts for safeguarding your organization
Skills you'll gain
- Category: Cybersecurity Threats
- Category: Cybersecurity Controls
- Category: Physical Threats and Controls
Details to know
Add to your LinkedIn profile
13 assignments
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
In this module, you'll receive a concise overview detailing the history of cybersecurity, along with insights into key events that influenced the global approach to cybersecurity. You’ll learn about critical thinking, its significance, and how it applies in real-world scenarios within cybersecurity. Additionally, you’ll gain a clear understanding of the five key elements of the critical thinking model. Finally, you will delve into the five critical thinking skills that help form the foundation of critical thinking in every professional field, including cybersecurity.
What's included
7 videos1 reading3 assignments1 discussion prompt5 plugins
In this module, you will discover various threat actors and their motivations, and explore the trends highlighted in the latest IBM Security X-Force Threat Intelligence Index. You will also explore emerging trends in cybersecurity. Additionally, you will study malware and ransomware tactics, along with strategies to protect your system against them. The module will also introduce social engineering and its applications by cybercriminals. Finally, you will identify essential tips to safeguard your system against phishing, vishing, and smishing attempts.
What's included
8 videos4 assignments1 app item8 plugins
In this module, you will learn about a range of internet security threats, including network mapping, packet sniffing, ID spoofing, denial-of-service (DoS) attacks, and injection attacks. You'll also gain insights into system, network, and application security, and engage in practical exercises to implement security controls. Furthermore, you'll delve into vulnerability assessment, incident response, and digital forensics.
What's included
11 videos1 reading3 assignments3 plugins
In this module, you will learn about identity and access management (IAM) and its four main categories. You will explore various authentication protocols and methods to verify an individual's identity and gain a clear understanding of different access control schemes. Additionally, you will compare traditional and innovative access control methods and explore multifactor authentication, single sign-on, and passkeys. Finally, you will learn about various threats that can impact an organization's cybersecurity and identify different security measures for deterring them.
What's included
8 videos1 reading3 assignments4 plugins
In this module, you will complete a final project on multifactor authentication that will provide you with an opportunity to apply the knowledge and skills acquired in this course. You will also take a graded exam to evaluate your understanding of various cybersecurity tools and attacks.
What's included
1 video2 readings1 app item1 plugin
Instructors
Offered by
Why people choose Coursera for their career
Learner reviews
Showing 3 of 15710
15,710 reviews
- 5 stars
69.95%
- 4 stars
21.32%
- 3 stars
5.18%
- 2 stars
1.70%
- 1 star
1.83%
Reviewed on Feb 25, 2023
Reviewed on Mar 16, 2022
Reviewed on Oct 14, 2021
Frequently asked questions
You will receive an email notification from Credly Acclaim with instructions for claiming the badge. Upon accepting your badge, it will be necessary to create a user account on Acclaim, where you will have the ability to manage your badge(s), opt-in to other communications and features, as well as take advantage of features allowing you to share your badge to social media and other destinations.
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.
The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.