DN
Nov 2, 2021
I find this course to be the most useful in terms of practical application. Some of the previous courses felt a bit bogged down by the technical aspects, but I guess this may be unavoidable.
FB
Oct 27, 2021
The best part of the course is the investigative work though it is an online web research in articles it is done with the vision of the knoweldge acquire through the different courses
By James H
•Jul 9, 2020
there wasn't any teaching. Just someone reading to you.
By adedeji
•Jul 1, 2020
I strongly recommend this course for any one/person interested in going into cyber security either as a trainer or practitioner.
By BHABESH K D
•Jun 18, 2020
too dificult to make an report or project but it was good experienced.
By Victor N
•May 5, 2023
Excelente curso, muy practico y dinamico, los laboratorios en linea de IBM son una excelente manera de practicar los eventos del mundo real. Muy bueno lo recomiendo 100%
By George M
•Apr 27, 2021
Very good material. It is interesting to create a case study.
It was challenging to find enough material from open sources which can help you built up the scenario.
By Mohamed M
•Jun 26, 2020
Great I like It especially the Case Study Attack Report
By Eshan M “ H
•Aug 24, 2020
Content is Very good. Although the Admins could look in to the peer-review process, its very slow and people have to wait days. Of about 100 posts in the discussion forum, more than 95 are people asking why their assignments are not getting reviewed.
By ALI E
•Jun 20, 2020
thank you, very informative course
By Andrew J
•Dec 29, 2022
Clever assignment. But, the instructions for grading fall short. I have a feeling my comments were not committed when I submitted when I should have clicked to add a comment. I also have a feeling the assignments are not really someone else's actual work. One submission was extremely bad - so bad as to suggest that it was a plant. But, whatever, I did my own work with diligence and that's what matters.
By David N
•Nov 2, 2021
I find this course to be the most useful in terms of practical application. Some of the previous courses felt a bit bogged down by the technical aspects, but I guess this may be unavoidable.
By Frank B
•Oct 28, 2021
The best part of the course is the investigative work though it is an online web research in articles it is done with the vision of the knoweldge acquire through the different courses
By N U K
•Feb 13, 2023
It's been an great opportunity to study this course and knowing about the industry behind it and Thank you for the lectures for teaching, I had a good time studying.
By Mark R
•Oct 30, 2020
Good exercise to use skills and information obtained through this course to do a real world data breach review.
By GAJENDRA R
•Sep 20, 2020
Great course for beginners in Information Security
By Muhammad Z H
•Jul 28, 2020
Thanks
By Jonathan V C
•Apr 16, 2021
This could be a part of another course, is like they run out of material and create a 4 week course justo to charge you more. 5 to 10 obvious questions for each 5 case studies, then the peer graded assignment that is just filling a powerpoint template, I work hard on that template, and people just upload random PDF's and two times they upload my own assignment, I report them but I think most of the people pass with just random content or plagiarizing. Peer graded assignments doesn't work anymore.
By Francesco B
•Jun 12, 2024
As an Engineering student with a keen interest in cybersecurity, taking the "Cybersecurity Capstone: Breach Response Case Studies" course has been an invaluable experience. This course dives deep into real-world scenarios of cybersecurity breaches and the critical strategies employed to respond effectively. One of the most compelling aspects of the course is its practical approach. Instead of theoretical concepts alone, the course focuses on case studies that bring to light the complexities and challenges faced by cybersecurity professionals during breach incidents. These case studies cover a range of scenarios, from data breaches in large corporations to targeted attacks on government institutions, providing a comprehensive view of the cybersecurity landscape. The course structure is well-organized, starting with foundational knowledge on incident response frameworks and methodologies. It then progresses to detailed analyses of specific breach incidents, dissecting the timeline, root causes, impact assessment, and most importantly, the response strategies deployed. Each case study is presented with meticulous detail, allowing students to understand not only what went wrong but also how effective responses were formulated and executed. The learning materials are enriched with practical resources such as simulated incident response exercises, which simulate real-time scenarios and challenge students to apply their knowledge in a controlled environment. This hands-on approach is crucial for reinforcing theoretical concepts and preparing students for the dynamic and fast-paced nature of cybersecurity incidents in the real world. Furthermore, the course benefits greatly from the expertise of instructors who are seasoned professionals in the field of cybersecurity. Their insights and firsthand experiences enhance the learning experience, providing valuable industry perspectives that go beyond textbook knowledge. In conclusion, "Cybersecurity Capstone: Breach Response Case Studies" is an exceptional course for anyone looking to deepen their understanding of cybersecurity incident response. It not only equips students with practical skills and knowledge but also prepares them to tackle the complexities of cybersecurity breaches with confidence. I highly recommend this course to Engineering students and cybersecurity enthusiasts alike who are eager to explore the fascinating and critical field of breach response.
By Kevin E M J
•Sep 14, 2022
I am in school for my BS in CyberSecurity with a focus on Intelligence and Forensic Studies. This course pushed me, and will make me better at my job. This course will ultimately help me to better analyze and detect problems faster, and by doing that I will be able to save companies, or my government millions of dollars in the long run.
By M M
•Jun 17, 2023
This gave me the opportunity to study and go through with real world Cybersecurity Attacks & Cases that affected the Companies, Groups or Entities.
Thanks IBM Security Services & Coursera in organizing the course.
Best Regards
Mehraj Ali Mohammed
By Laurentiu B
•May 30, 2023
Lots of useful information. Well presented and explained, although I must say all video courses read by some lady are difficult to follow, because she just reads the transcript with no intonation at all. Apart from that, only good stuff.
By Sergio H A
•Apr 14, 2023
This course was very interesting form other point of view, the way that we do an analysis of the breaches changes the perspective of our own criteria.
I enjoyed this but in some way it was a little difficult resolve some assessments.
By C C
•Nov 27, 2022
It was hectic!! but I love it.
Thank you all for a job well done. Thank you IBM, The Coursera and The American Dream Academy for such a professional, hardworking and awesome bunch.
On to the end.....
Sincerely,
Consuelo Cabrera
By Ни Л А
•Apr 6, 2023
On this course, the last task was interesting, the assessment of fellow students, the ability to reveal the topic.
The course is very important, it is clearly and clearly described and correctly presented in video lectures.
By Promise F O
•Jun 18, 2024
This course is so detailed with all the necessary knowledge and strategy needed to be successful in the field of cyber security. Kudos to the team for a job well done
By JOAQUIN C G
•Feb 26, 2023
It is a fantastic initiation to research and learning in the world of cybersecurity, the beginning of a very long learning trajectory which never ends.