We may earn an affiliate commission when you visit our partners.
Course image
- IBM -

Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge!

Read more

Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge!

In this course you will hear from IBM Cybersecurity specialists who will share their expertise from supporting some of the world’s largest organizations.

Various compliance and industry standards will be discussed including standards from the National Institute of Standards and Technology (NIST), Center of Internet (CIS) controls and International Organization for Standardization (ISO).

Global considerations will be addressed around the General Data Protection Regulation (GDPR).

Data protection regulations concerning personal data including phone number, credit card information and other sensitive data for healthcare and credit cards are reviewed.

You will learn the basic commands for user and server administration as it relates to information security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.

You will learn the concepts of endpoint security and patch management. Both of these topics are important to keep systems current to avoid cybersecurity risks against an organization.

Finally you will learn in depth skills around cryptography and encryption to understand how these concepts affect software within a company.

What you'll learn

  • Describe the challenges organizations face which require compliance and regulation.
  • Describe the key privacy and data protection requirements for GDPR.
  • Define the three rules established as standards for the Health Insurance Portability and Accountability Act (HIPAA).
  • Describe the Payment Card Industry Data Security Standard (PCI DSS).
  • Describe the differences between basic, foundational and organizational Center for Internet Security (CIS) controls.
  • Describe the basics of endpoint protection and response.
  • Understand why patching is important to avoid cybersecurity threats.
  • Describe the principle of least privileges.
  • Describe Windows and Linux security management considerations.
  • Define cryptography and encryption.
  • Define common pitfalls of cryptography.

Three deals to help you save

What's inside

Learning objectives

  • Describe the challenges organizations face which require compliance and regulation.
  • Describe the key privacy and data protection requirements for gdpr.
  • Define the three rules established as standards for the health insurance portability and accountability act (hipaa).
  • Describe the payment card industry data security standard (pci dss).
  • Describe the differences between basic, foundational and organizational center for internet security (cis) controls.
  • Describe the basics of endpoint protection and response.
  • Understand why patching is important to avoid cybersecurity threats.
  • Describe the principle of least privileges.
  • Describe windows and linux security management considerations.
  • Define cryptography and encryption.
  • Define common pitfalls of cryptography.

Syllabus

Module 1: Compliance Frameworks and Industry Standards
In this module you will learn the importance of understanding compliance frameworks and industry standards as it relates to Cybersecurity. You will learn about and investigate additional resources from the National Institute of Standards and Technology, the American Institute of CPAs and the Center for Internet Security. You will learn different industry standards for Healthcare and the Payment Card industries.
Read more
Module 2: Client System Administration, Endpoint Protection and Patching
In this module you will learn about client system administration, endpoint protection and patching. You will learn the differences between endpoint protection; endpoint protection and detection; and unified endpoint management. You will learn what patching is and the patching process most organizations execute to secure their environments from threats.
Module 3: Server and User Administration
In this module you will learn about user management for Windows and Linux. You will also learn about security vulnerabilities for both operating systems and key components that you should be aware of as you develop skill in the Cybersecurity industry.
Module 4: Cryptography and Compliance Pitfalls
In this module you will learn about cryptography and encryption through the eyes of a penetration tester. You will learn about common pitfalls organizations face with cryptography especially when developing products. You will learn the different digital states of data including Data at Rest, Data in Use and Data in Transit. You will learn about hashing and how it relates to encryption

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores compliance frameworks and industry standards, which are standard in Cybersecurity
Taught by IBM, who are recognized for their work in Cybersecurity
Develops skills for user and server administration, which are core skills for Cybersecurity
Examines endpoint protection and patching, which are highly relevant to Cybersecurity
Introduces cryptography and encryption, which are essential concepts in Cybersecurity
Teaches industry regulations such as GDPR, HIPAA, and ISO, which are essential for Cybersecurity compliance

Save this course

Save Cybersecurity Compliance and System Administration to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybersecurity Compliance and System Administration with these activities:
Review of basic computer commands
Computer commands form the backbone of several tasks and understanding these will help improve learning as the course progresses.
Browse courses on User Administration
Show steps
  • Review the basic commands for managing files and directories, creating and editing text files, and performing basic system tasks.
  • Practice using these commands in a command-line interface (CLI) or terminal window.
Review Windows Security Management
Familiarize yourself with basic Windows Security Management concetps.
Browse courses on Security Management
Show steps
  • Review Windows Security Features
  • Configure User Account Control (UAC)
  • Implement Local Security Policy
  • Manage Windows Firewall
Review Linux Security Management
Familiarize yourself with basic Linux Security Management concetps.
Browse courses on Security Management
Show steps
  • Review Linux Security Features
  • Configure User and Group Permissions
  • Implement SELinux or AppArmor
  • Manage Linux Firewall
11 other activities
Expand to see all activities and additional details
Show all 14 activities
Complete a Cybersecurity MOOC or Online Course
Enhance your cybersecurity knowledge and skills through structured online learning.
Browse courses on Professional Development
Show steps
  • Identify Relevant MOOCs or Online Courses
  • Enroll and Complete the Course
  • Participate in Discussions and Forums
  • Apply New Knowledge to Practical Situations
Review and Synthesize Course Materials
Enhance your understanding by reviewing, organizing, and connecting course materials.
Show steps
  • Gather and Organize Notes, Quizzes, and Assignments
  • Review and Summarize Key Concepts
  • Identify and Fill in Knowledge Gaps
  • Create Mind Maps or Concept Diagrams
Build a Personal Cybersecurity Toolkit
Hands-on experience with cybersecurity tools will greatly enhance your ability to understand and apply concepts.
Browse courses on Cybersecurity Tools
Show steps
  • Identify the essential cybersecurity tools and software for your needs.
  • Install and configure these tools on your computer or virtual machine.
  • Learn how to use each tool effectively through tutorials or documentation.
Workshop: Understanding Cryptography Concepts
Cryptography is a complex but vital topic, and this workshop will help bring the concepts to life.
Browse courses on Cryptography
Show steps
  • Attend a workshop or webinar on cryptography concepts.
  • Follow along with the instructor and ask questions as needed.
  • Complete any exercises or assignments provided by the instructor.
Analyze Security Logs and Events
Develop your ability to analyze security logs and events to identify potential threats.
Browse courses on Event Monitoring
Show steps
  • Collect and Review Security Logs
  • Use Tools for Log Analysis
  • Identify and Investigate Security Incidents
  • Document and Report Findings
Join a Cybersecurity Study Group or Discussion Forum
Engage with peers to discuss cybersecurity concepts, share knowledge, and solve problems.
Show steps
  • Identify and Join a Relevant Study Group or Forum
  • Participate in Discussions and Ask Questions
  • Share Your Knowledge and Insights
  • Collaborate on Projects or Assignments
Endpoint Security and Patch Management Exercises
Endpoint security and patch management are critical for preventing cyberattacks. This activity will reinforce what you learn in the course.
Browse courses on Endpoint Security
Show steps
  • Find practice exercises or online quizzes on endpoint security and patch management.
  • Complete the exercises or quizzes to test your understanding of the concepts.
  • Review your results and identify areas where you need additional study.
Introduction to Penetration Testing
By learning the same techniques used by attackers, you'll gain valuable insights into cybersecurity vulnerabilities.
Browse courses on Penetration Testing
Show steps
  • Follow online tutorials or take a course on penetration testing.
  • Set up a virtual lab environment for practice.
  • Practice using penetration testing tools and techniques to identify vulnerabilities.
Cybersecurity Capture the Flag (CTF) Competition
CTF competitions provide an immersive and gamified approach to practicing cybersecurity skills.
Browse courses on Cybersecurity
Show steps
  • Find a CTF competition that aligns with your skill level and interests.
  • Join a team or participate individually.
  • Solve the challenges presented in the competition.
  • Collaborate with your team and learn from others.
Develop a Security Incident Response Plan
Create a comprehensive plan to guide your organization's response to security incidents.
Browse courses on Incident Management
Show steps
  • Define Incident Response Roles and Responsibilities
  • Establish Communication and Notification Procedures
  • Develop Incident Response Procedures
  • Test and Revise the Incident Response Plan
Contribute to an Open-Source Cybersecurity Project
Gain practical experience and contribute to the cybersecurity community.
Browse courses on Software Development
Show steps
  • Identify a Suitable Open-Source Project
  • Understand the Project's Codebase and Requirements
  • Make Code Contributions
  • Test and Review Your Contributions

Career center

Learners who complete Cybersecurity Compliance and System Administration will develop knowledge and skills that may be useful to these careers:
Information Security Administrator
An Information Security Administrator is responsible for implementing and maintaining an organization's information security program. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different compliance frameworks and industry standards that organizations must adhere to, as well as how to implement and manage endpoint protection and patching solutions.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for identifying, analyzing, and responding to cybersecurity threats. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different types of cybersecurity threats that organizations face, as well as how to investigate and respond to them.
IT Auditor
An IT Auditor is responsible for assessing an organization's IT systems and controls to ensure that they are compliant with regulatory requirements. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different compliance frameworks and industry standards that organizations must adhere to, as well as how to conduct IT audits.
Compliance Manager
A Compliance Manager is responsible for ensuring that an organization complies with all applicable laws and regulations. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different compliance frameworks and industry standards that organizations must adhere to, as well as how to develop and implement compliance programs.
Risk Manager
A Risk Manager is responsible for identifying, assessing, and mitigating risks to an organization. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different types of risks that organizations face, as well as how to develop and implement risk management plans.
Security Architect
A Security Architect is responsible for designing and implementing an organization's security architecture. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different components of a security architecture, as well as how to design and implement security solutions.
Network Administrator
A Network Administrator is responsible for managing and maintaining an organization's computer network. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different components of a computer network, as well as how to manage and maintain network security.
System Administrator
A System Administrator is responsible for managing and maintaining an organization's computer systems. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different components of a computer system, as well as how to manage and maintain system security.
Database Administrator
A Database Administrator is responsible for managing and maintaining an organization's database systems. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different components of a database system, as well as how to manage and maintain database security.
Cloud Architect
A Cloud Architect is responsible for designing and implementing an organization's cloud computing infrastructure. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different components of a cloud computing infrastructure, as well as how to design and implement cloud security solutions.
Information Security Consultant
An Information Security Consultant is responsible for providing advice and guidance to organizations on cybersecurity matters. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different aspects of information security, as well as how to develop and implement information security solutions.
Security Engineer
A Security Engineer is responsible for designing and implementing security solutions for an organization. This course can help you develop the skills and knowledge needed to succeed in this role by providing you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different types of security solutions, as well as how to design and implement them.
Software Engineer
A Software Engineer is responsible for designing, developing, and testing software applications. This course may be useful for you if you are interested in a career as a Software Engineer, as it will provide you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different aspects of software development, as well as how to develop secure software applications.
Cybersecurity Instructor
A Cybersecurity Instructor is responsible for teaching cybersecurity courses to students. This course may be useful for you if you are interested in a career as a Cybersecurity Instructor, as it will provide you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different aspects of cybersecurity, as well as how to develop and deliver cybersecurity courses.
Technical Writer
A Technical Writer is responsible for writing technical documentation, such as user manuals, white papers, and training materials. This course may be useful for you if you are interested in a career as a Technical Writer, as it will provide you with a strong foundation in cybersecurity compliance and system administration. You will learn about the different types of technical documentation, as well as how to write clear and concise technical documents.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybersecurity Compliance and System Administration.
Provides a comprehensive overview of ISO 27001, the international standard for information security management. It covers a wide range of topics, including information security risk management, information security controls, and information security incident response.
Provides a comprehensive introduction to cryptography and secure communications. It covers fundamental concepts, encryption algorithms, hash functions, digital signatures, and network security protocols, making it a valuable resource for students and cybersecurity practitioners.
This textbook provides a comprehensive overview of network security. It covers topics like network architecture, security threats, firewalls, intrusion detection systems, and cloud security, making it a useful resource for students and IT professionals alike.
Provides insights into the human factors of cybersecurity. It explores social engineering techniques, psychological vulnerabilities, and countermeasures, emphasizing the importance of understanding and mitigating human risks in cybersecurity.
Provides a comprehensive overview of cryptography and network security. It covers a wide range of topics, including cryptography, network security, and information security.
Provides a comprehensive overview of Linux security. It covers a wide range of topics, including Linux security threats, Linux security controls, and Linux security management.
Provides a comprehensive overview of network security. It covers a wide range of topics, including network security threats, network security controls, and network security management.
Provides a comprehensive overview of cybersecurity. It covers a wide range of topics, including cybersecurity threats, cybersecurity controls, and cybersecurity management.
Provides a comprehensive overview of information security. It covers a wide range of topics, including information security threats, information security controls, and information security management.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cybersecurity Compliance and System Administration.
Cybersecurity Compliance Framework & System Administration
Most relevant
Developer Security Champion: Data Protection Standards
Most relevant
Data Security Champion: Data Encryption
Most relevant
Basic Network and Database Security
Most relevant
Cloud Security on AWS
Most relevant
Cyber Threat Intelligence
Most relevant
Data Privacy and Protection Standards
Most relevant
Cybersecurity Fundamentals - Become a Security Expert
Most relevant
How To Develop An Information Security Program
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser