Principals

Overview

This course covers threat intelligence sources. You will learn about data protection risks and explore mobile endpoint protection. Finally, you will recognize various scanning technologies, application security vulnerabilities, and threat intelligence platforms. This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the sixth course in a series to acquire the skills to work in the field as a Cybersecurity Analyst.

img-course-overview.jpg

What You'll Learn

In this course you will learn to:

  • Describe cybersecurity trends, drivers, and threats
  • List the various costs of a cybersecurity breach
  • Identify threat intelligence external sources
  • Describe each step in the threat intelligence strategy map
  • List key publications to review for insights into strategic threat intelligence plans
  • Describe various threat intelligence platforms and resources
  • Explain how to use various cyberthreat frameworks
  • List best practices for intelligent detection of threats
  • Define security intelligence
  • Identify the three pillars of effective threat detection
  • Explain the importance of improving security effectiveness
  • Define data protection and security and explain its purpose
  • Describe common data security challenges
  • Discuss common pitfalls in data security
  • Identify industry-specific data security challenges
  • Identify the 12 critical capabilities for a data protection solution
  • Describe Guardium as an example of a data protection solution
  • Describe the primary vulnerabilities of mobile endpoints
  • Discuss the available security options for mobile endpoints
  • Explain day-to-day mobile endpoint management
  • Manage mobile endpoint security using IBM MaaS360
  • Explain how vulnerability scanners work
  • Describe how vulnerability scanners are used
  • Explain how to use the Common Vulnerability Scoring System (CVSS) to assign vulnerability scores
  • Explain the use of the Security Technical Implementation Guide to enhance the overall security posture
  • Explain how to use the Center for Internet Security (CIS) Benchmark hardening/vulnerability checklists
  • Describe port scanning
  • Describe the information gained from port scanning
  • Describe the Nmap and Zenmap port scanning applications
  • Explain what network protocol analyzers are
  • Describe Wireshark
  • Describe the packet capture file format
  • Identify the characteristics of a security architecture
  • Describe the different types of high-level security architectural models
  • Describe how to decompose solutions to identify threats and specify security controls
  • Explain how to use security patterns to accelerate security development for infrastructure and applications
  • Describe the pros and cons of various software development lifecycles
  • Describe application security techniques and tools
  • Discuss application threats and attacks
  • Summarize the OWASP top 10 application security risks
  • Describe security standards and regulations
  • Explain DevSecOps and its effect on application security
  • Explain how to write secure application code
  • Define cross-site scripting and describe its dangers
  • Explain how to defend against cross-site scripting
  • Define the key terms for security information event management (SIEM)
  • Explore the role of SIEM in networks and moderate security operation centers
  • Describe key considerations for deploying a SIEM system
  • Discuss different SIEM solutions and their components
  • Explain the features of QRadar for security analysis
  • Analyze and report on cybersecurity events using IBM QRadar SIEM
  • Investigate user behavior using the IBM QRadar User Behavior Analytics app (UBA)
  • Describe use cases for UBA
  • List the advantages of an integrated UBA solution in a security operation center (SOC)
  • List the challenges that SOCs face
  • Explain the benefits of artificial intelligence (AI) for cyberanalysts
  • Describe the features and functions of an industry example using QRadar Advisor with Watson
  • Investigate cybersecurity events using QRadar Advisor with Watson
  • Discuss global cyber trends and challenges
  • Explain why SOCs need to perform threat hunting
  • Explain the primary goal of SOC cyber threat hunting
  • Apply the cyber threat hunting concepts to an industry example
  • Describe the structure of a cyber threat hunting team
  • Examine cyber threat hunting with i2 use case examples
  • Investigate cybersecurity threats using QRadar Analyst Workflow

Who Should Attend

Anyone who wants to gain a basic understanding of Cybersecurity or as the sixth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.

img-who-should-learn.png

Prerequisites

None

Learning Journey

Coming Soon...

Unit 1: Threat Intelligence

Unit 2: Data Loss Prevention and Mobile Endpoint Protection

Unit 3: Scanning

Unit 4: Application Security and Testing

Unit 5: SIEM Platforms

Unit 6: Threat Hunting

Instructors

Scott Duffy

Bestselling Azure & TOGAF® Trainer, Microsoft Azure MVP

4.8 (4.1k)
|
10 Courses
profile-instructor-a.png
Scott Duffy

Bestselling Azure & TOGAF® Trainer, Microsoft Azure MVP

4.8 (4.1k)
|
10 Courses
profile-instructor-a.png

Frequently Asked Questions (FAQs)

  • Why get IBM certified?

    IBM certifications validate your skills and expertise in a wide range of technologies, including hybrid cloud, data & AI, security, IT infrastructure, and business applications.

    These certifications are globally recognized and can help you advance your career, increase your earning potential, and demonstrate your commitment to professional development.

    IBM-certified professionals are in high demand, making them valuable assets to any organization seeking to leverage IBM's innovative solutions.

  • What to expect for the examination?

    IBM offers a variety of certification exams at different levels (Basic, Intermediate, and Advanced) covering various technologies and job roles.

    Exams typically consist of multiple-choice questions and may include scenario-based questions that assess your ability to apply your knowledge in real-world situations.

    Note: Certification requirements and policies may be updated by IBM from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is IBM certification valid for?

    The validity period of IBM certifications varies. Some certifications, particularly those focused on specific product versions or technologies, may have expiration dates.

    However, many IBM certifications, especially those focused on broader skills or newer technologies, do not have an expiration date.

    Note: Certification requirements and policies may be updated by IBM from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 16 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Training Schedule

Exam & Certification

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name
Email
Phone
I'm inquiring for

Inquiry Details

By providing your contact details, you agree to our Privacy Policy.