Introduction to Cybersecurity Tools & Cyber Attacks

Keywords List

to

of

and

the

The

will

WILL

Will

you

You

Summary

• Introduction to Cybersecurity Tools & Cyber AttacksAbout this CourseThis course gives you the background needed to understand basic Cybersecurity.

• You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals.

• Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field.You will learn about critical thinking and its importance to anyone looking to pursue a career in Cybersecurity.Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the first course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.The completion of this course also makes you eligible to earn the Introduction to Cybersecurity Tools & Cyber Attacks IBM digital badge.

• More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/introduction-to-cybersecurity-tools-cyber-attacksWHAT YOU WILL LEARNDiscuss the evolution of security based on historical eventsDescribe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.List various types of malicious software.Identify key cybersecurity tools which include the following: firewall, anti-virus, cryptography, penetration testing and digital forensics.SKILLS YOU WILL GAIN Information Security (INFOSEC) IBM New Collar Malware Cyber Attacks CybersecurityInstructorIBM is a global company with subject matter experts in a range of job roles.

• The material in this course is taught by subject matter experts that are assisting our clients every day in the field at their locations, as ethical hackers and penetration testers as well as in our Security Operation Centers.

Original Content