Cybersecurity Capstone: Breach Response Case Studies
Offered By: IBM via Coursera
Course Description
Overview
This course gives you the background needed to gain Cybersecurity skills as part of the IBM Cybersecurity Professional Certificate programs.
You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization.
Finally, you will explore the costs of data breaches through research studies and well known breaches.
This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course.
This course is intended for anyone who wants to explore examples of Cybersecurity breaches to work in the Cybersecurity field as a Cybersecurity Analyst or a Cybersecurity Specialist.
The completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge.
In this course, you will learn to:
● Apply incident response methodologies.
● Research and describe a watering hole attack.
● Research and describe ransomware threats and the consequences to organization.
● Research and describe 3rd party breaches and how they affect an organization.
● Research and describe the effects of a phishing attack.
● Research and describe a point of sale attack and approximate cost of data breaches.
● Perform a case study on a current cyber attack and breach.
Syllabus
- Incident Management Response and Cyberattack Frameworks
- In this module, you will review Incident Management Response and explore one of the frameworks for Cyberattack in detail.
- Phishing Scams
- In this module, you will learn about phishing scams in detail and explore a case study of a phishing attack on two corporations.
- Point of Sale Breach
- In this module, you will learn about Point of Sale breaches and the impacts to an organization through case studies.
- 3rd Party Breach
- In this module, you will learn about 3rd Party breaches and the impacts to an organization through case studies.
- Ransomware
- In this module, you will learn about Ransomware breaches and the impacts to an organization through case studies.
- Apply Your Skill - Data Breaches
- In this module, you will learn to apply your skill to recognize data breaches, vulnerabilities and costs for a specific company.
Taught by
IBM Security Learning Services
Tags
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX Disaster, Crisis, and Emergency Preparedness Communication
State University of New York via Coursera Become an Ethical Hacker
LinkedIn Learning Developing Secure Software
LinkedIn Learning