IBM Security Learning Services
Acerca de este Curso
Este curso le brinda los antecedentes necesarios para comprender la ciberseguridad básica en torno a las personas, proceso y tecnología. Aprenderás:
- Comprender los roles clave de ciberseguridad dentro de una organización.
- Enumere los procesos clave de ciberseguridad y un ejemplo de cada proceso.
- Describir la arquitectura, los sistemas de archivos y los comandos básicos para varios sistemas operativos, incluidos Windows, Mac/OS, Linux y Mobile.
- Comprender el concepto de virtualización en relación con la ciberseguridad
Finalmente, comenzará a aprender sobre organizaciones y recursos para investigar más a fondo los problemas de ciberseguridad en la era moderna. Este curso está destinado a cualquier persona que quiera obtener una comprensión básica de la Ciberseguridad o como el segundo curso de una serie de cursos para adquirir las habilidades para trabajar en el campo de la Ciberseguridad como Analista de Ciberseguridad Jr. La finalización de este curso también lo hace elegible para obtener la insignia digital IBM de Roles de ciberseguridad, procesos y seguridad del sistema operativo. Puede encontrar más información sobre la insignia aquí: https://www.youracclaim.com/org/ibm/badge/cybersecurity-roles-processes-operating-system-security
- Cybersecurity Capstone: Breach Response Case Studies
- Terrorism Financing
- Cyber Threat Intelligence
- MITRE ATT&CK.
- Calibre, lectura y aprendizaje.
Semana 1.
People Process & Technology
Este módulo lo guiará a través de una organización de seguridad típica. También aprenderá sobre el marco de gestión de servicios y cómo afecta la forma en que una organización utilizará este marco para evitar o reaccionar ante los ataques de ciberseguridad. También investigará los procesos estándar de ITIL.
Objetivos de aprendizaje
- Analice la importancia de la gestión de procesos comerciales y las ventajas de seguir las mejores prácticas de gestión de servicios de TI documentadas en ITIL, la biblioteca de infraestructura de TI.
- Describir los roles clave dentro de la Ciberseguridad.
Semana 2
Examples & Principles of the CIA Triad
Este módulo explicará qué es la tríada de la CIA y cómo es importante para los conceptos y la práctica de la seguridad cibernética.
Objetivos de aprendizaje
- Recordemos la definición de la Tríada CIA
- Analice la confidencialidad, la integridad y la disponibilidad en relación con la ciberseguridad.
- Resuma ejemplos de dónde la integridad es importante hoy en día.
Semana 3
Windows Operating System Security Basics
En este módulo, aprenderá sobre el sistema de archivos y las estructuras de directorios del sistema operativo Windows. También aprenderá acerca de muchos accesos directos y comandos que lo ayudarán a navegar por el sistema de Windows para recopilar información y reducir su tiempo de trabajo.
Objetivos de aprendizaje
- Describir los componentes de Windows, el modo Usuario y el modo Kernel, y en qué se diferencian.
- Describir los sistemas de archivos jerárquicos NTFS y FATxx utilizados por Windows.
- Explicar la estructura de directorios de Windows y cómo maneja Windows la separación de las aplicaciones de 32 y 64 bits.
- Recuerde los diversos métodos abreviados de teclado útiles proporcionados por Windows.
Semana 4
Overview of Virtualization
En este módulo, aprenderá los conceptos básicos de virtualización y computación en la nube. También aprenderá sobre el gobierno, la seguridad y los beneficios de la computación en la nube.
Objetivos de aprendizaje
- Describir el concepto de virtualización y qué es un hipervisor y una máquina virtual.
- Describir los modelos de nube pública, privada e híbrida. ¿Qué consideraciones te llevarían a elegir uno sobre otro?
- Practique la investigación de áreas de conocimiento de ciberseguridad utilizando los documentos de investigación de los institutos SANS y el Internet Storm Center.
Certificado de Aprobación.
Fuente: “Cybersecurity Roles, Processes and Operating System Security.” Coursera, © 2022 Coursera Inc. Todos los derechos reservados., www.coursera.org/learn/cybersecurity-roles-processes-operating-system-security. Accessed 3 Aug. 2022.
Especialista en seguridad de la información, ciberseguridad, redes y telecomunicaciones militares, serví en la Armada de Chile por un período de 27 años dónde lideré equipos de apoyo a operaciones de inteligencia Naval, En los últimos 07 me he dedicado a formalizar una carrera en Ciberseguridad, profundizando mis competencias en Mitre, SOC, CEH, CCNA Security y todo le que este a mi alcance. Espero que mi pequeño blog ayude de alguna manera a quien quiera aprender.
I’m amazed, I must say. Rarely do I come across a blog that’s
both equally educative and interesting, and without a doubt, you’ve hit the nail on the head.
The problem is something which too few folks are speaking
intelligently about. I’m very happy I came across
this in my search for something relating to
this.
Thank you very muchrocket league car hitboxes for your kind message, the truth is that every time I finish and approve a new course, I upload information about it in order to encourage more people to dare to study and improve their curriculum. you are cordially invited to my Telegram: https://t.me/cybersecurity_learning and my old and trusty IRC channel https://www.irccloud.com/irc/libera.chat/channel/loadmasther-room
I really like it whenever people get together and share ideas.
Great site, stick with it!
Thank you very much for your kind comment, we can continue sharing ideas on my modest Telegram and my old and reliable IRC channel, I always reply to valuable people who are curious to learn.
My Telegram channel https://t.me/cybersecurity_learning , my IRC channel https://www.irccloud.com/irc/libera.chat/channel/loadmasther-room
I wait for you friend.
I’ve read a few good stuff here. Definitely worth bookmarking for revisiting.
I surprise how so much effort you place to make such a excellent
informative website.
Thanks for your comment, I will continue uploading content to my blog anyway, it would help me a lot if you join my Telegram channel and IRC channel, where we can share ideas and content.
My Telegram channel https://t.me/cybersecurity_learning , my IRC channel https://www.irccloud.com/irc/libera.chat/channel/loadmasther-room
See you later.
Hey terrific blog! Does running a blog like this take a great deal of work?
I’ve very little knowledge of programming but I was hoping to
start my own blog in the near future. Anyhow, should you have any suggestions
or techniques for new blog owners please share. I understand this is off topic
nevertheless I simply wanted to ask. Thanks a lot!
Hello Friend.
Thanks for the comment, it doesn’t bother me at all and I can share with you what you need so that you can create your own Blog with the topic that you like or interest the most.
We can share information on my Telegram channel and my IRC channel.
My Telegram channel https://t.me/cybersecurity_learning , my IRC channel https://www.irccloud.com/irc/libera.chat/channel/loadmasther-room
I wait for you soon.
No matter if some one searches for his vital thing, so
he/she needs to be available that in detail, thus that thing is maintained
over here.
I used to be able to find good info from your blog
posts.
I used to be able to find good information from your
blog posts.
Howdy! I’m at work surfing around your blog from my new iphone 4!
Just wanted to say I love reading through your blog
and look forward to all your posts! Carry on the outstanding work!
Thank you for reading my Blog, my apologies for not uploading new information yet, I am finishing the Cyber Threat Intelligence course, it is the sixth of 8 courses to finish the IBM Cybersecurity Analyst Specialization and receive the certification.
We can share information on my Telegram channel and my IRC channel.
My Telegram channel https://t.me/cybersecurity_learning, my IRC channel https://www.irccloud.com/irc/libera.chat/channel/loadmasther-room
We’ll be in touch.
You actually make it seem so easy with your presentation but I find
this topic to be really something which I think I would
never understand. It seems too complex and extremely broad for me.
I am looking forward for your next post, I’ll try to get the hang of it!
Although it seems complex to understand, it is very useful for those who want to learn cybersecurity and want to obtain the IBM Cybersecurity Analyst Specialization certificate, what happens is that the program itself consists of 8 courses and this is only one of those. Each course is taught in order of least to most content complexity, but as described by IBM, these courses are for anyone with the curiosity and perseverance to learn. Soon I will upload the contents of the 3 courses that I am missing or any other topic that is interesting to address. See you and thank you for your kind comment.
I really enjoyed what you did here. The illustration is elegant, and the writing is well-written, but there’s a sense of unease that you might be delivering something more, which would probably happen again if you continue this hike.
Thank you for your input. I’m planning to broaden the range of interesting topics on my blog. The idea is to modify the current editorial focus, which currently revolves mainly around brief reviews of cybersecurity certifications and courses I have completed (and, most importantly, passed). The main goal is to establish myself as a reliable source of the knowledge I possess. The motto is: «If I could, you can too.»
The modification I’ll implement involves studying a book on specific aspects of cybersecurity. After completing it, I’ll write a short review on my blog, accompanied by a real-life example or a small investigation demonstrating the practical application of the theory. Regards.
hiI like your writing so much share we be in contact more approximately your article on AOL I need a specialist in this area to resolve my problem Maybe that is you Looking ahead to see you
Thank you for the auspicious writeup It in fact was a amusement account it Look advanced to far added agreeable from you However how can we communicate
helloI really like your writing so a lot share we keep up a correspondence extra approximately your post on AOL I need an expert in this house to unravel my problem May be that is you Taking a look ahead to see you
I was recommended this website by my cousin I am not sure whether this post is written by him as nobody else know such detailed about my trouble You are amazing Thanks
Hi i think that i saw you visited my web site thus i came to Return the favore I am attempting to find things to improve my web siteI suppose its ok to use some of your ideas
helloI like your writing very so much proportion we keep up a correspondence extra approximately your post on AOL I need an expert in this space to unravel my problem May be that is you Taking a look forward to see you