Cybersecurity Compliance and System Administration
IBM Cybersecurity Fundamentals,
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge!
In this course you will hear from IBM Cybersecurity specialists who will share their expertise from supporting some of the world’s largest organizations.
Various compliance and industry standards will be discussed including standards from the National Institute of Standards and Technology (NIST), Center of Internet (CIS) controls and International Organization for Standardization (ISO).
Global considerations will be addressed around the General Data Protection Regulation (GDPR).
Data protection regulations concerning personal data including phone number, credit card information and other sensitive data for healthcare and credit cards are reviewed.
You will learn the basic commands for user and server administration as it relates to information security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.
You will learn the concepts of endpoint security and patch management. Both of these topics are important to keep systems current to avoid cybersecurity risks against an organization.
Finally you will learn in depth skills around cryptography and encryption to understand how these concepts affect software within a company.
What you'll learn
- Describe the challenges organizations face which require compliance and regulation.
- Describe the key privacy and data protection requirements for GDPR.
- Define the three rules established as standards for the Health Insurance Portability and Accountability Act (HIPAA).
- Describe the Payment Card Industry Data Security Standard (PCI DSS).
- Describe the differences between basic, foundational and organizational Center for Internet Security (CIS) controls.
- Describe the basics of endpoint protection and response.
- Understand why patching is important to avoid cybersecurity threats.
- Describe the principle of least privileges.
- Describe Windows and Linux security management considerations.
- Define cryptography and encryption.
- Define common pitfalls of cryptography.
Get a Reminder
Rating | Not enough ratings |
---|---|
Length | 4 weeks |
Effort | 4 weeks, 3–4 hours per week |
Starts | On Demand (Start anytime) |
Cost | $149 |
From | IBM via edX |
Instructors | Coreen Ryskamp, - IBM - |
Download Videos | On all desktop and mobile devices |
Language | English |
Subjects | Programming |
Tags | Computer Science |
Get a Reminder
Similar Courses
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
Technical Operations Analyst Data Protection $62k
Assistant Systems Administrator - Data Protection $70k
Data Protection Advisor $74k
Protection $81k
Sales Business Analyst- Data Protection Solutions $94k
Systems Administrator - Data Protection $96k
Senior Data Protection and Storage Analyst $129k
Data Protection Architect $146k
Senior Data Protection & Availability Division System Engineer $155k
Data Protection Specialist/Backup Administrator $161k
Principal Global Systems Engineer, Data Management and Protection $166k
Vice Senior President Privacy and Data Protection Counsel $197k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | Not enough ratings |
---|---|
Length | 4 weeks |
Effort | 4 weeks, 3–4 hours per week |
Starts | On Demand (Start anytime) |
Cost | $149 |
From | IBM via edX |
Instructors | Coreen Ryskamp, - IBM - |
Download Videos | On all desktop and mobile devices |
Language | English |
Subjects | Programming |
Tags | Computer Science |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course