According to a recent IBM report, cyberattacks have surged 71%! This alarming statistic highlights a huge demand for cybersecurity professionals. This IBM course will introduce you to fundamental cybersecurity concepts, threats, and preventive measures to start your cybersecurity journey.
Introduction to Cybersecurity Tools & Cyberattacks
This course is part of multiple programs.
Instructors: IBM Skills Network Team
Sponsored by Coursera Learning Team
454,759 already enrolled
(15,754 reviews)
Recommended experience
What you'll learn
How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets
How to recognize various types of threat actors and malware and explore preventive measures
To identify various internet security threats and common cybersecurity best practices
To understand authentication and identity management concepts for safeguarding your organization
Details to know
Add to your LinkedIn profile
13 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
In this module, you'll receive a concise overview detailing the history of cybersecurity, along with insights into key events that influenced the global approach to cybersecurity. You’ll learn about critical thinking, its significance, and how it applies in real-world scenarios within cybersecurity. Additionally, you’ll gain a clear understanding of the five key elements of the critical thinking model. Finally, you will delve into the five critical thinking skills that help form the foundation of critical thinking in every professional field, including cybersecurity.
What's included
7 videos1 reading3 assignments1 discussion prompt5 plugins
In this module, you will discover various threat actors and their motivations, and explore the trends highlighted in the latest IBM Security X-Force Threat Intelligence Index. You will also explore emerging trends in cybersecurity. Additionally, you will study malware and ransomware tactics, along with strategies to protect your system against them. The module will also introduce social engineering and its applications by cybercriminals. Finally, you will identify essential tips to safeguard your system against phishing, vishing, and smishing attempts.
What's included
8 videos4 assignments1 app item8 plugins
In this module, you will learn about a range of internet security threats, including network mapping, packet sniffing, ID spoofing, denial-of-service (DoS) attacks, and injection attacks. You'll also gain insights into system, network, and application security, and engage in practical exercises to implement security controls. Furthermore, you'll delve into vulnerability assessment, incident response, and digital forensics.
What's included
11 videos1 reading3 assignments3 plugins
In this module, you will learn about identity and access management (IAM) and its four main categories. You will explore various authentication protocols and methods to verify an individual's identity and gain a clear understanding of different access control schemes. Additionally, you will compare traditional and innovative access control methods and explore multifactor authentication, single sign-on, and passkeys. Finally, you will learn about various threats that can impact an organization's cybersecurity and identify different security measures for deterring them.
What's included
8 videos1 reading3 assignments4 plugins
In this module, you will complete a final project on multifactor authentication that will provide you with an opportunity to apply the knowledge and skills acquired in this course. You will also take a graded exam to evaluate your understanding of various cybersecurity tools and attacks.
What's included
1 video2 readings1 app item1 plugin
Instructors
Offered by
Why people choose Coursera for their career
Learner reviews
15,754 reviews
- 5 stars
70%
- 4 stars
21.30%
- 3 stars
5.16%
- 2 stars
1.70%
- 1 star
1.82%
Showing 3 of 15754
Reviewed on Jan 8, 2023
This is a very good cause. My problem is video transcripts, they have lots of mistakes. If you can improve that I would give it 5 stars. I am very grateful for the bursary that I received. Thank you.
Reviewed on Oct 14, 2021
Great introductory course. The mobile app makes it easy to learn on the go at your own pace. Some of the audio is a bit patchy at times, but the ability to review the transcript helps make up for it.
Reviewed on Mar 16, 2022
Great Course Content and Explanation. Some Audio problems cost it *. Audio could have been better for most of the course parts. Thank You IBM for offering this course. Thank you all the instructors.
Recommended if you're interested in Information Technology
University of London
Kennesaw State University
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy