Identify and Investigate Cybersecurity Threats!

Course Description

Imagine what could happen if someone penetrated your IT or industrial system and gained access to personal data, client data, proprietary business information, research and development, or code in your production facilities. When the topic of IT security came up, people used to immediately think of antivirus software, firewalls, and other logical and physical security measures. Stuxnet, data thefts, and other cyberattacks against government institutions and corporate organizations are indications that the security landscape is rapidly changing. Respond to that change by learning how do today’s cyberattacks target organizations and how to identify them and respond to them in a matter of hours instead of months!

Course Modules

1. Introduction to Cybersecurity
2. Unit Objectives
3. Glossary of technical terms
4. What is Cybersecurity
5. The importance of Cybersecurity
6. Most common Cybersecurity attacks
7. The future of Cybersecurity jobs
8. Cognitive Security
9. IBM Security Immune system
10. User stories
11. Exercise: Investigate suspicious activities with IBM Qradar SIEM
12. Assessment - Quiz
13. Wrap up

Course Duration

Course Time Allocation: 4 hours
Additional time: 30 minutes


Badge Issued