YoVDO

Basic Network and Database Security

Offered By: IBM via edX

Tags

Network Security Courses Databases Courses Cybersecurity Courses SQL Injection Courses Ethernet Courses Intrusion Detection Systems Courses OSI Model Courses

Course Description

Overview

Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge!

This course gives you the background needed to understand basic types of network security. You will learn about computer networks including Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization and network security controls that guard an organization from cybersecurity attacks.

In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch. You will learn about various security data types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. Ultimately you will learn how to safeguard an organizations sensitive information against data loss from cyberattacks.

This course will give you a basic understanding of network security and sensitive data protection services or as part of the overall Cybersecurity basics professional certificate.


Syllabus

Module 1: TCP/IP Framework

In this module, you will learn about the TCP/IP Framework, Ethernet and Lan Networks, and the basics around routing and switching. You will also learn about address translation and the basic differences between Intrusion Detection and Intrusion Prevention Systems. Finally, you will learn about network packets.

Module 2: Basics of IP Addressing and the OSI Model

In this module, you will learn the basics of IP Addressing and how it affects the network traffic routing. You will about application and transport protocols. You will learn about firewalls and additional information in regards to Intrusion Detection and Intrusion prevention systems. Finally, you will learn the concepts of high availability and clustering.

Module 3: Introduction to Databases

In this module you will learn to define data source and model types as well as types of data. You will also review how to use best practices to secure your organizations data. Finally, you will get an in depth look at use cases around an example of a Data Protection solution, IBM Security Guardium.

Module 4: Deep Dive - Injection Vulnerability

In this module you will hear an IBM Subject Matter expert discuss the common vulnerability of Injection. You will learn the basics around OS Command Injection and SQL Injection.


Taught by

Coreen Ryskamp

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network