Warning: WP Redis: Connection refused in /www/wwwroot/cmooc.com/wp-content/plugins/powered-cache/includes/dropins/redis-object-cache.php on line 1433
网络安全角色、过程和操作系统安全 | MOOC中国 - 慕课改变你,你改变世界

网络安全角色、过程和操作系统安全

Cybersecurity Roles, Processes & Operating System Security

1827 次查看
IBM
Coursera
  • 完成时间大约为 10 个小时
  • 混合难度
  • 英语
注:本课程由Coursera和Linkshare共同提供,因开课平台的各种因素变化,以上开课日期仅供参考

课程概况

This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn:

• Understand the key cybersecurity roles within an Organization.
• List key cybersecurity processes and an example of each process.
• Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile.
• Understand the concept of Virtualization as it relates to cybersecurity

Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era.

This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.

The completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. More information about the badge can be found here: https://www.youracclaim.com/org/ibm/badge/cybersecurity-roles-processes-operating-system-security

课程大纲

People Process & Technology

This module will take you through a typical Security organization. You will also learn about the service management framework and how it affects how an organization will use this framework to avoid or react to cybersecurity attacks. You will also research ITIL standard processes.

Examples & Principles of the CIA Triad

This module will explain what is the CIA Triad and how is it important to cybersecurity concepts and practice.

Authentication and Access Control

In this module you will learn the importance of authentication and identification. You will also learn how access controls both physical and logical help safeguard an organization. You will also investigate an identified risk around access control.

Windows Operating System Security Basics

In this module you will learn about the file system and directory structures for the Windows operating system. You will also learn about many shortcuts and commands which will help you to navigate the Windows system to gather information and reduce your work time.

Linux Operating System Security Basics

In this module you will learn the key components of the Linux operating system and basic commands required to assist you in accessing information that pertains to the security of your systems. You will also access Pentestmonkey a resource many cybersecurity professionals use to access cheat sheets about certain cybersecurity vulnerabilities and investigations.

macOS Security Basics

In this module you will learn how to find resources around MAC/OS. You will read documentation from Apple around the security framework and how to investigate additional information through the eyes of a developer.

Overview of Virtualization

In this module, you will learn the basics of virtualization and cloud computing. You will also learn about cloud computing governance, security and benefits.

千万首歌曲。全无广告干扰。
此外,您还能在所有设备上欣赏您的整个音乐资料库。免费畅听 3 个月,之后每月只需 ¥10.00。
Apple 广告
声明:MOOC中国十分重视知识产权问题,我们发布之课程均源自下列机构,版权均归其所有,本站仅作报道收录并尊重其著作权益。感谢他们对MOOC事业做出的贡献!
  • Coursera
  • edX
  • OpenLearning
  • FutureLearn
  • iversity
  • Udacity
  • NovoEd
  • Canvas
  • Open2Study
  • Google
  • ewant
  • FUN
  • IOC-Athlete-MOOC
  • World-Science-U
  • Codecademy
  • CourseSites
  • opencourseworld
  • ShareCourse
  • gacco
  • MiriadaX
  • JANUX
  • openhpi
  • Stanford-Open-Edx
  • 网易云课堂
  • 中国大学MOOC
  • 学堂在线
  • 顶你学堂
  • 华文慕课
  • 好大学在线CnMooc
  • (部分课程由Coursera、Udemy、Linkshare共同提供)

© 2008-2022 CMOOC.COM 慕课改变你,你改变世界