Cyber Security

Cyber Security

Rating
4.5/5
Today many organizations across all industries are faced with unmanageable levels of cyber threats brought on by the changing threat landscape, the risk of exposure, and an evergrowing attack surface. The optimum strategy to respond to this combination of factors is to make security an integral part of culture and overall structure—to help organizations better prepare for their digital transformation in the age of the fourth industrial revolution.

Program Overview

This course comprises a unique mix of cyber security technical and real-world industry skills, brought to provide awareness on the impact of cyber security threats in key industries and geographies.

Cyber security Practitioners – Can elevate organizations’ overall security posture, by adopting practices, methods and tools that increase enterprise cyber resilience. Practitioners provide awareness on the latest cyber threats and can help set the foundations for the implementation of an incident response team and a security operations center.

Audience

Individuals with an active interest in applying for entry level jobs to work in cybersecurity related fields

Prerequisite skills for this course:

  • Basic IT literacy skills
  • Fundamentals of Internet networking, such as IP addresses, ports, routing browsers, servers, HTTP, web sites, encryption

Key Features

IBM Program Advantage

IBM Training and certifications offers you the ability to earn credentials to demonstrate your expertise. It is designed to validate your skills and capability to perform role-related tasks and activities at a specified level of competence.

Learning Path

Cyber Security Overview
  • Status quo of IT security
  • Security Intelligence and operations
Security Intelligence Foundations
  • Designing a Security Intelligence solution
  • Security Intelligence functional components

Security Intelligence Engineer

  • Collecting and processing events, flows, and vulnerability data
  • Investigating an offense that is triggered by events
  • Investigating the events of an offense
  • Using asset profiles to investigate offenses
  • Investigating an offense that is triggered by flows
  • False positives overview
  • Investigating superflows
  • Using rules and building blocks
  • Creating SIEM reports
  • Performing advanced filtering

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Program Duration: 75 Hours

40 Hours Online Training
35 Hours Lab

Completion Certificate

awarded on course completion

Online Bootcamp

Learning Format

Make An Enquiry








    Powered by