Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Cybersecurity Capstone: Breach Response Case Studies

Course Cover

5

(8)

compare button icon
Course Report - Cybersecurity Capstone:  Breach Response Case Studies

Course Report

Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.

Course Features

icon

Duration

16 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

icon

Video Content

16 hours

Course Description

This course will give you the knowledge and background to become a Cybersecurity Security Analyst Professional Certificate.

This course will cover security models and incident response methods. You will be able to identify and classify key vulnerabilities and attack vectors against organizations today. To learn more about past and current breaches, you will be able to examine in detail how they were discovered and what could have been done to reduce their threat to your organization. You will also learn about the cost of data breaches using research studies and examples from actual breaches. You will need to research and analyze a cybersecurity incident in the news today. Your peers will grade your project. This course is for anyone looking to get a basic understanding about Cybersecurity. It also serves as the seventh course in a series to help you become a Cybersecurity Analyst. You can also earn the Cybersecurity Capstone - Breach Response Case Studies IBM digital badge upon completion of this course. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cybersecurity-breach-case-studies . This course will teach you how to: * Use incident response methods. * Research and describe a watering holes attack. Research ransomware threats, and their consequences for organizations. • Research and discuss 3rd-party breaches and their effects on an organization. * Research and discuss the consequences of phishing attacks. * Research and discuss a point-of-sale attack and the approximate cost of data breaches. * Conduct a case study of a cyber attack or breach.

Course Overview

projects-img

Virtual Labs

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Incident Management Response and Cyberattack Frameworks

You will learn about phishing scams in detail and explore a case study of a phishing attack on two corporations

You will learn about Point of Sale breaches and the impacts to an organization through case studies

Course Instructors

IBM Security Learning Services

IBM Global Subject Matter Experts

IBM is a global company with subject matter experts in a range of job roles. The material in this course is taught by subject matter experts that are assisting our clients every day in the field at t...

Course Reviews

Average Rating Based on 8 reviews

4.9

88%

13%

Course Cover