Chevron Left
Back to Cybersecurity Capstone: Breach Response Case Studies

Learner Reviews & Feedback for Cybersecurity Capstone: Breach Response Case Studies by IBM

4.8
stars
1,462 ratings

About the Course

This course gives you the background needed to gain Cybersecurity skills as part of the IBM Cybersecurity Professional Certificate programs. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization. Finally, you will explore the costs of data breaches through research studies and well known breaches. This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course. This course is intended for anyone who wants to explore examples of Cybersecurity breaches to work in the Cybersecurity field as a Cybersecurity Analyst or a Cybersecurity Specialist. The completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge. In this course, you will learn to: ● Apply incident response methodologies. ● Research and describe a watering hole attack. ● Research and describe ransomware threats and the consequences to organization. ● Research and describe 3rd party breaches and how they affect an organization. ● Research and describe the effects of a phishing attack. ● Research and describe a point of sale attack and approximate cost of data breaches. ● Perform a case study on a current cyber attack and breach....

Top reviews

DN

Nov 2, 2021

I find this course to be the most useful in terms of practical application. Some of the previous courses felt a bit bogged down by the technical aspects, but I guess this may be unavoidable.

FB

Oct 27, 2021

The best part of the course is the investigative work though it is an online web research in articles it is done with the vision of the knoweldge acquire through the different courses

Filter by:

1 - 25 of 268 Reviews for Cybersecurity Capstone: Breach Response Case Studies

By James H

Jul 9, 2020

there wasn't any teaching. Just someone reading to you.

By adedeji

Jul 1, 2020

I strongly recommend this course for any one/person interested in going into cyber security either as a trainer or practitioner.

By BHABESH K D

Jun 18, 2020

too dificult to make an report or project but it was good experienced.

By Mohamed M

Jun 26, 2020

Great I like It especially the Case Study Attack Report

By Eshan M “ H

Aug 24, 2020

Content is Very good. Although the Admins could look in to the peer-review process, its very slow and people have to wait days. Of about 100 posts in the discussion forum, more than 95 are people asking why their assignments are not getting reviewed.

By Victor N

May 5, 2023

Excelente curso, muy practico y dinamico, los laboratorios en linea de IBM son una excelente manera de practicar los eventos del mundo real. Muy bueno lo recomiendo 100%

By George M

Apr 27, 2021

Very good material. It is interesting to create a case study.

It was challenging to find enough material from open sources which can help you built up the scenario.

By ALI E

Jun 20, 2020

thank you, very informative course

By Andrew J

Dec 29, 2022

Clever assignment. But, the instructions for grading fall short. I have a feeling my comments were not committed when I submitted when I should have clicked to add a comment. I also have a feeling the assignments are not really someone else's actual work. One submission was extremely bad - so bad as to suggest that it was a plant. But, whatever, I did my own work with diligence and that's what matters.

By David N

Nov 2, 2021

I find this course to be the most useful in terms of practical application. Some of the previous courses felt a bit bogged down by the technical aspects, but I guess this may be unavoidable.

By Frank B

Oct 28, 2021

The best part of the course is the investigative work though it is an online web research in articles it is done with the vision of the knoweldge acquire through the different courses

By N U K

Feb 13, 2023

It's been an great opportunity to study this course and knowing about the industry behind it and Thank you for the lectures for teaching, I had a good time studying.

By Mark R

Oct 30, 2020

Good exercise to use skills and information obtained through this course to do a real world data breach review.

By GAJENDRA R

Sep 20, 2020

Great course for beginners in Information Security

By Muhammad Z H

Jul 28, 2020

Thanks

By Jonathan V C

Apr 16, 2021

This could be a part of another course, is like they run out of material and create a 4 week course justo to charge you more. 5 to 10 obvious questions for each 5 case studies, then the peer graded assignment that is just filling a powerpoint template, I work hard on that template, and people just upload random PDF's and two times they upload my own assignment, I report them but I think most of the people pass with just random content or plagiarizing. Peer graded assignments doesn't work anymore.

By Francesco B

Jun 12, 2024

As an Engineering student with a keen interest in cybersecurity, taking the "Cybersecurity Capstone: Breach Response Case Studies" course has been an invaluable experience. This course dives deep into real-world scenarios of cybersecurity breaches and the critical strategies employed to respond effectively. One of the most compelling aspects of the course is its practical approach. Instead of theoretical concepts alone, the course focuses on case studies that bring to light the complexities and challenges faced by cybersecurity professionals during breach incidents. These case studies cover a range of scenarios, from data breaches in large corporations to targeted attacks on government institutions, providing a comprehensive view of the cybersecurity landscape. The course structure is well-organized, starting with foundational knowledge on incident response frameworks and methodologies. It then progresses to detailed analyses of specific breach incidents, dissecting the timeline, root causes, impact assessment, and most importantly, the response strategies deployed. Each case study is presented with meticulous detail, allowing students to understand not only what went wrong but also how effective responses were formulated and executed. The learning materials are enriched with practical resources such as simulated incident response exercises, which simulate real-time scenarios and challenge students to apply their knowledge in a controlled environment. This hands-on approach is crucial for reinforcing theoretical concepts and preparing students for the dynamic and fast-paced nature of cybersecurity incidents in the real world. Furthermore, the course benefits greatly from the expertise of instructors who are seasoned professionals in the field of cybersecurity. Their insights and firsthand experiences enhance the learning experience, providing valuable industry perspectives that go beyond textbook knowledge. In conclusion, "Cybersecurity Capstone: Breach Response Case Studies" is an exceptional course for anyone looking to deepen their understanding of cybersecurity incident response. It not only equips students with practical skills and knowledge but also prepares them to tackle the complexities of cybersecurity breaches with confidence. I highly recommend this course to Engineering students and cybersecurity enthusiasts alike who are eager to explore the fascinating and critical field of breach response.

By Kevin E M J

Sep 14, 2022

I am in school for my BS in CyberSecurity with a focus on Intelligence and Forensic Studies. This course pushed me, and will make me better at my job. This course will ultimately help me to better analyze and detect problems faster, and by doing that I will be able to save companies, or my government millions of dollars in the long run.

By M M

Jun 17, 2023

This gave me the opportunity to study and go through with real world Cybersecurity Attacks & Cases that affected the Companies, Groups or Entities.

Thanks IBM Security Services & Coursera in organizing the course.

Best Regards

Mehraj Ali Mohammed

By Laurentiu B

May 30, 2023

Lots of useful information. Well presented and explained, although I must say all video courses read by some lady are difficult to follow, because she just reads the transcript with no intonation at all. Apart from that, only good stuff.

By Sergio H A

Apr 14, 2023

This course was very interesting form other point of view, the way that we do an analysis of the breaches changes the perspective of our own criteria.

I enjoyed this but in some way it was a little difficult resolve some assessments.

By C C

Nov 27, 2022

It was hectic!! but I love it.

Thank you all for a job well done. Thank you IBM, The Coursera and The American Dream Academy for such a professional, hardworking and awesome bunch.

On to the end.....

Sincerely,

Consuelo Cabrera

By Ни Л А

Apr 6, 2023

On this course, the last task was interesting, the assessment of fellow students, the ability to reveal the topic.

The course is very important, it is clearly and clearly described and correctly presented in video lectures.

By Promise F O

Jun 18, 2024

This course is so detailed with all the necessary knowledge and strategy needed to be successful in the field of cyber security. Kudos to the team for a job well done

By JOAQUIN C G

Feb 26, 2023

It is a fantastic initiation to research and learning in the world of cybersecurity, the beginning of a very long learning trajectory which never ends.