Introduction to Cybersecurity Tools & Cyberattacks

This course is part of multiple programs. Learn more

Instructors: IBM Skills Network Team +1 more

Instructor ratings

We asked all learners to give feedback on our instructors based on the quality of their teaching style.

What you'll learn

  •   How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets
  •    How to recognize various types of threat actors and malware and explore preventive measures
  •    To identify various internet security threats and common cybersecurity best practices
  •   To understand authentication and identity management concepts for safeguarding your organization
  • Skills you'll gain

  •   Multi-Factor Authentication
  •   Authorization (Computing)
  •   Network Security
  •   Cybersecurity
  •   Cyber Attacks
  •   Threat Management
  •   Identity and Access Management
  •   Security Awareness
  •   Malware Protection
  •   Threat Detection
  •   Computer Security Incident Management
  •   Infrastructure Security
  •   Incident Response
  •   Security Controls
  •   Authentications
  •   Distributed Denial-Of-Service (DDoS) Attacks
  • There are 5 modules in this course

    In this course, you’ll explore the evolution of cybersecurity and discover the critical thinking model. You’ll also cover threat actors, malware, ransomware, and defenses against social engineering. Additionally, you’ll learn about internet security threats and security controls. You’ll explore the fundamentals of identity and access management (IAM), authentication, and access control. You’ll also look at the physical threats organizations encounter and consider effective security measures. Throughout, you’ll build practical knowledge through hands-on labs and gain technical expertise through insights from industry experts. Your final project will enable you to effectively demonstrate your understanding of cybersecurity principles. This course is for anyone who wants a basic understanding of cybersecurity and is part of a series designed to help you start a career as a Cybersecurity Analyst.

    Cybersecurity Threats

    Cybersecurity Controls

    Identity and Physical Controls

    Final Project and Course Wrap-Up

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved