Cybersecurity Roles, Processes & Operating System Security

 

IBM Training for Cybersecurity Roles, Processes & Operating System Security

Skill Level: Basic

Modality:  WBT - Web Based Training - Self Paced

Duration: 1.2 Day/s

Starting Price:  $ - 297

Overview:

This course gives you the background needed to understand basic Cybersecurity around people, process, and technology.

This course provides information about cybersecurity people, processes, and technology. Learn the key cybersecurity roles and processes within an organization. Then move to the architecture, file systems, and basic commands for various operating systems. Finally, learn how virtualization relates to cybersecurity. This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the second course in a series to acquire the skills to work in the field as a Cybersecurity Analyst.


Request a Quote

Email
Multiple Choice
How did you hear about us?
Yes, I would like to receive special offers from CRS.
Yes, I would like to receive special offers from CRS.


Target Audience:

This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Junior Cybersecurity Analyst..

.

Prerequisites: None.

Topic: Unit 1 - People Process & TechnologyUnit 2 - Examples & Principles of the CIA TriadUnit 3 - Authentication and Access ControlUnit 4 - Windows Operating System Security Basics.

IBM Training

Objective: What you can do upon completion of this course:Define IT security

  • Explain the purpose of frameworks, baselines, and best practices in cybersecurity
  • Discuss typical roles in an information security department
  • Define security operation center (SOC)
  • Define process in the context of business management and describe its attributes
  • Describe standard process roles
  • Explain what makes a process successful
  • Discuss typical process performance metrics
  • Summarize continual process improvement
  • Define information technology infrastructure library (ITIL)
  • Describe each phase of the ITIL lifecycle
  • Describe key terms and characters from the Alice and Bob cryptography scenario
  • Define confidentiality, integrity, and availability in the context of cybersecurity and discuss their important components
  • Define authenticity and accountability in the context of cybersecurity
  • Explain identification and AAA in the context of cybersecurity
  • Identify the three types of authentication methods
  • Discuss the types of access control and their subcategories
  • Describe common access control methods
  • Discuss access control best practices
  • Identify examples of physical and logical access control methods
  • Discuss types of monitoring and access control processes
  • Summarize how to use the Open Web Application Security Project (OWASP) to discover the top ten web application vulnerabilities for a given year and how to address them
  • Compare and contrast Windows’s two modes: user and kernel
  • Define file system and hierarchical structure
  • Contrast the NTFS and FAT file systems that Windows uses
  • Describe the Windows directory structure
  • Summarize how Windows handles the separation of 32-bit and 64-bit applications
  • Describe various useful keyboard shortcuts applicable to Windows
  • Discuss important characteristics of Linux
  • Explain the relationship between Linux kernel and shell
  • Describe Linux file system and directory structure
  • Explain what happens at each Linux run level
  • Recall basic Linux shell commands and the functions that they perform
  • Describe Linux file and directory permission structure
  • Explain how to use the Linux shell to change a file’s permissions and owner
  • Install and run a Kali Linux virtual machine using VirtualBox
  • Perform administrative tasks to strengthen security on Kali Linux
  • Explain how to view system information, current activity, and log files in macOS
  • Summarize the various security settings within macOS
  • Discuss macOS recovery partition and the services that it offers
  • Contrast virtualized and traditional environments
  • Describe the roles of hosts, hypervisors, and virtual machines in a virtualized environment
  • Summarize how organizations move from virtualized to cloud environments
  • List the steps required to deploy services to the cloud
  • Define cloud computing
  • Discuss the advantages and disadvantages of cloud computing
  • Contrast the three cloud deployment models: public, private, and hybrid
  • Summarize essential functions listed in the cloud computing reference model
  • Contrast the three cloud service models: software as a service, platforms as a service, and infrastructure as a service
  • Describe important components of cloud security
  • Summarize the alignment between governance, service, and organization needed to achieve an effective cloud security strategy
  • Category: Security

     

    Product Name:

    IBM Security Education

     

    Badge and Certification Info:

    Badge Title: Cybersecurity Roles, Processes & OS Security

    Badge ID: ff0a37af-3097-4827-a89f-405db1a3b80a

     

    Brand: IBM Security

     

    IBM Training is available now.

    Cyber Retaliator Solutions (CRS) is a Cyber Security Distributor, Authorized IBM Training Center, Red Hat and SUSE Training Partner, and a CompTIA Training Delivery Partner, operating throughout the Globe. Our Head Office is in Centurion South Africa, with IBM Training Centers in Centurion, Midrand, Sandton, Cape Town, California CA, Florida FL, New York NY, Washington DC, Georgia GA, Texas TX.

     

    CRS is the Top Global Training Provider for some of the world's biggest brands.

    Authorized Training delivered to you by the global leader in IBM Training.

     

    Select courses in:

    IBM Cloud

    DataPower

    IBM Automation

    IBM Rational

    Watson

    IBM Tivoli

    IBM Systems

    Cognos

    IBM Storage

    Mainframe

    IBM Security

    System Z

    IBM Industry

    IBM Asset Management

    Websphere

    IBM Data and AI

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.

    Authorized IBM Training

    RedHat Training

    SUSE Training

    Agile SAFe Training

    Cyber Awareness Training

    Cyber Security

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.

     

    Authorized IBM Training
    RedHat Training
    SUSE Training
    Cyber Awareness Training
    Agile SAFe Training
    Cyber Security

     

     

    CRS offers

    IBM Training

    and

    IBM Certification Training

    across

    The United States of America

    with locations:

    4700 Millenia Blvd., Orlando, Florida 32839

    250 Park Avenue, New York, New York 10177

    4900 California Avenue, Tower B, Bakersfield, California 93309

    1300 I Street NW, Washington, District of Columbia 20005

    235 W Roosevelt Ave, Albany, Georgia 31701

    4400 Buffalo Gap Rd., Abilene, Texas 79606

     

     

    Follow CRS:

     

    Follow on Courses:

    Replaced By: 

    8H111 8H110 cyber security cybersecurity system analyst

    The price on this page are indicative. Please contact CRS via the above form to confirm pricing.

    Call Now +27 12 023 1959