Vendors

In this course, you will explore incident response methodologies and security models, and will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will do an in-depth review of several past and recent breaches to learn how they were detected and what was done, or could have been done, to reduce the threat risk to the organization. Finally, you will explore the costs of data breaches through research studies and well known breaches.At the end of this course, you will select and research a cybersecurity breach in the news today. You will apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by the course instructor.This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the seventh and final course in a series to acquire the skills to work in the field as a Cybersecurity Analyst.

img-course-overview.jpg

What You'll Learn

In this course you will learn to:

  • Discuss the actions recommended by the National Institute of Standards and Technology (NIST) for establishing an incident response capability
  • Describe critical considerations for assembling an incident response team
  • Identify the essential requirements of each phase of the incident response lifecycle
  • Configure automatic processing of inbound email using the IBM Resilient platform
  • Describe each phase of a cyberattack detailed in the IBM X-Force IRIS cyberattack framework
  • Identify tips for preventing cyberattacks
  • Describe data breaches, including their common characteristics
  • Summarize the timeline of the Target Corporation data breach
  • Identify vulnerabilities exploited in the Target Corporation data breach
  • Describe the cost of the Target Corporation data breach
  • List measures that could have prevented the Target Corporation data breach
  • Explain how watering hole attacks work
  • Explain how phishing scams work
  • Describe different types of phishing scams
  • Identify the common signs of a phishing email
  • Describe the impact of phishing on individuals and corporations
  • Identify common types of identity theft
  • Summarize the timeline of the Facebook and Google phishing breach
  • Identify vulnerabilities exploited in the Facebook and Google phishing breach
  • Describe the cost and impact of the Facebook and Google phishing breach
  • List measures that could have prevented the Facebook and Google phishing breach
  • Explain the objective of a Point-of-Sale (PoS) breach
  • Describe PoS systems, including their security standards
  • Explain how malware infects PoS devices
  • Identify the different types of PoS malware
  • Explain what happens to information stolen in a PoS breach
  • List best practices for preventing PoS breaches
  • Summarize the timeline of the Home Depot PoS breach
  • Identify vulnerabilities exploited in the Home Depot PoS breach
  • Describe the cost and impact of the Home Depot PoS breach
  • List cybersecurity measures implemented to combat attacks such as those used in the Target and Home Depot breaches
  • Define third-party breach
  • Describe the types of third-party breaches
  • List best practices for preventing third-party breaches
  • Describe the impact of third-party breaches on individuals and businesses
  • Summarize the timeline of the Quest Diagnostics third-party breach
  • Identify vulnerabilities exploited in the Quest Diagnostics third-party breach
  • Describe the impact of the Quest Diagnostics third-party breach
  • Identify third-party breach prevention techniques developed from an analysis of companies that successfully prevent such breaches
  • Explain what ransomware is
  • Distinguish different types of ransomware
  • Describe ways in which users become ransomware targets
  • Identify techniques for protecting against ransomware attacks
  • List common examples of ransomware
  • Identify techniques used to extract money from ransomware victims
  • Summarize the timeline of the Atlanta ransomware breach
  • Identify vulnerabilities exploited in the Atlanta ransomware breach
  • Describe the cost and impact of the Atlanta ransomware breach
  • List measures that could have prevented the Atlanta ransomware breach
  • Create a data breach case study by applying what you learned in this course and others in the Cybersecurity Security Analyst Professional Certificate program

Who Should Attend

Anyone who wants to gain a basic understanding of Cybersecurity or as the seventh course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.

img-who-should-learn.png

Prerequisites

None

Learning Journey

Coming Soon...

Unit 1: Incident Management Response and Cyberattack Frameworks

Unit 2: Phishing Scams

Unit 3: Point of Sale Breach

Unit 4: 3rd Party Breach

Unit 5: Ransomware

Unit 6: Apply Your Skill - Data Breaches

Frequently Asked Questions (FAQs)

  • Why get IBM certified?

    IBM certifications validate your skills and expertise in a wide range of technologies, including hybrid cloud, data & AI, security, IT infrastructure, and business applications.

    These certifications are globally recognized and can help you advance your career, increase your earning potential, and demonstrate your commitment to professional development.

    IBM-certified professionals are in high demand, making them valuable assets to any organization seeking to leverage IBM's innovative solutions.

  • What to expect for the examination?

    IBM offers a variety of certification exams at different levels (Basic, Intermediate, and Advanced) covering various technologies and job roles.

    Exams typically consist of multiple-choice questions and may include scenario-based questions that assess your ability to apply your knowledge in real-world situations.

    Note: Certification requirements and policies may be updated by IBM from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • How long is IBM certification valid for?

    The validity period of IBM certifications varies. Some certifications, particularly those focused on specific product versions or technologies, may have expiration dates.

    However, many IBM certifications, especially those focused on broader skills or newer technologies, do not have an expiration date.

    Note: Certification requirements and policies may be updated by IBM from time to time. We apologize for any discrepancies; do get in touch with us if you have any questions.

  • Why take this course with Trainocate?

    Here’s what sets us apart:

    - Global Reach, Localized Accessibility: Benefit from our geographically diverse training hubs in 16 countries (and counting!).

    - Top-Rated Instructors: Our team of subject matter experts (with high average CSAT and MTM scores) are passionate to help you accelerate your digital transformation.

    - Customized Training Solutions: Choose from on-site, virtual classrooms, or self-paced learning to fit your organization and individual needs.

    - Experiential Learning: Dive into interactive training with our curated lesson plans. Participate in hands-on labs, solve real-world challenges, and take on comprehensive assessments.

    - Learn From The Best: With 30+ authorized training partnerships and countless awards from Microsoft, AWS, Google – you're guaranteed learning from the industry's elite.

    - Your Bridge To Success: We provide up-to-date course materials, helpful exam guides, and dedicated support to validate your expertise and elevate your career.

Keep Exploring

Course Curriculum

Course Curriculum

Training Schedule

Training Schedule

Exam & Certification

Exam & Certification

FAQs

Frequently Asked Questions

img-improve-career.jpg

Improve yourself and your career by taking this course.

img-get-info.jpg

Ready to Take Your Business from Great to Awesome?

Level-up by partnering with Trainocate. Get in touch today.

Name
Email
Phone
I'm inquiring for

Inquiry Details

By providing your contact details, you agree to our Privacy Policy.