YoVDO

Cyber Threat Intelligence

Offered By: IBM via Coursera

Tags

Threat Intelligence Courses Cybersecurity Courses Data Protection Courses Application Security Courses Data Loss Prevention Courses Cyber Threat Intelligence Courses

Course Description

Overview

This IBM course will teach you the critical skills needed to manage and investigate cybersecurity incidents. You will learn about key topics, including incident response frameworks (NIST and SANS), digital forensics methodologies, and best practices for handling digital evidence. Through hands-on labs and projects, you’ll gain practical experience in detecting, analyzing, and mitigating cybersecurity threats, as well as conducting forensic investigations using industry-standard tools. By the end of the course, you will be equipped to implement incident response plans, collect and analyze digital evidence, and report findings to support cybersecurity efforts. This course is ideal for learners looking to strengthen their expertise in digital forensics and incident response, making it an essential component for those aiming to advance in the cybersecurity field.

Syllabus

  • Incident Response
    • This module focuses on the concept and importance of incident response. You’ll learn about the key preparatory steps for incident response and the importance of thorough documentation throughout the incident response process. You will delve into detection and analysis techniques used to identify and understand security incidents, followed by containment, eradication, and recovery strategies to prevent further damage and restore systems. The module also highlights the tools and automation technologies that enhance response efforts and covers post-incident activities. By the end of this module, you will be well-equipped to manage and mitigate security incidents effectively.
  • Digital Forensics
    • This module explores the essential aspects of digital forensics and investigation. It provides an overview of digital forensics and highlights its importance in investigating cyber incidents. You'll learn the data collection and examination methods, including using Cowrie for log investigation. The module covers key topics about handling digital evidence to ensure integrity, analyzing and reporting findings, and understanding forensic data files. The module introduces various digital forensics tools and includes practical activities to apply knowledge in simulated investigations. Additionally, it covers the factors influencing data recovery. By the end of this module, you will be able to conduct thorough digital forensic investigations.
  • Final Project and Course Wrap-up

Taught by

IBM Security Learning Services

Tags

Related Courses

Cyber Security Incident Response for Managers
PA Consulting via FutureLearn
Manage the cyber threat for finance professionals
ACCA via edX
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Get Started with Threat Intelligence
Salesforce via Trailhead