Cybersecurity Roles, Processes and Operating System Security

BY
IBM via Coursera

Coursera has introduced Cybersecurity Roles, Processes & Operating System Security to acknowledge the importance of cybersecurity within an organization.

Lavel

Beginner

Mode

Online

Duration

4 Weeks

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

Cybersecurity Roles, Processes & Operating System Security programme is offered by IBM with a motive to make the people smarter as the world is getting digital. Through this programme, candidates would understand the key importance of cybersecurity in any organization. They will learn about the challenges faced by the organization in the Modern era and also how to overcome such challenges. The programme is appropriate for the candidates who aspire to work in the field of Cybersecurity as a Jr Cybersecurity Analyst.  

The course is inclusive of multiple programmes or specializations. Apart from cybersecurity, Coursera has introduced the concept of virtualization and it’s relevancy for cybersecurity. In 4 weeks, the candidates will have an understanding of Operating System Security and Cybersecurity roles & processes. They will also learn about the working of cybersecurity in different operating systems like Mac/OS, Mobile, Windows, and Linux. 

The highlights

  • Shareable Certificate
  • Subtitles available
  • Beginner's level
  • Flexible deadlines
  • Flexible schedule
  • Financial aid provided
  • Offered by IBM

Program offerings

  • 100% online
  • Practice exercise
  • Reading
  • Graded assignments
  • Pre-recorded modules

Course and certificate fees

 Cybersecurity Roles, Processes and Operating System Security Fees details:

Particulars

Amount

Course Fee, 1 Month

Rs. 4,085

Course Fee, 3 Month

Rs. 8,171

Course Fee, 6 Month

Rs. 12,256


certificate availability

Yes

certificate providing authority

Coursera

Who it is for

Cybersecurity Roles, Processes & Operating System Security by Coursera offers training to the following individuals -

  • Security Engineer
  • Security Software Developer
  • Security Architects
  • IT Security Analysts
  • Security Administrator
  • Analysts
  • Security manager

Eligibility criteria

Certification Qualifying Details

A candidate will get a course completion certificate if he/she has selected the “Audit mode”. However, the candidate must score well in the assignments, quizzes, and project exercises to get the certificate. 

What you will learn

Knowledge of linux
  • After completing the course, the participants will have hands-on experience in different operating systems like Mac/OS, Mobile, Windows, and Linux. The comprehensive study material would teach how to give basic commands on different operating systems. 
  • Once the course is completed, the candidate would earn a digital badge from IBM.  The tag of IBM would help the candidates in getting better job opportunities.

The syllabus

Week 1: People Process & Technology

Videos
  • What is IT security?
  • Introduction to Process
  • Key ITIL Processes
  • Overview of People, Process and Technologies
  • Information Technology Infrastructure Library (ITIL) Overview
  • Welcome to People, Process and Operating System Fundamentals for security.
  • Frameworks and their purpose
  • Business Process Management Overview
  • Roles in Security
Practice Exercise
  • Frameworks, Policies and Roles
  • People, Process and Technology
  • Welcome to People, Process and Operating System Fundamentals for Cybersecurity
  • Business Process Management and IT Infrastructure Library Basics
Readings
  • IBM Global Subject Matter Experts
    What is IT Service Management?
  • ITIL framework
  • Earn an IBM digital badge

Week 2: Examples & Principles of the CIA Triad

Videos
  • Confidentiality, Integrity and Availability
  • Introduction to the CIA Triad module
  • Priscilla Mariel Guzman Angulo - What's important for my job
  • Who are Alice, Bob and Trudy?
  • Authenticity and Accountability
Practice Exercise
  • Principles of the CIA Triad
  • Further discussion of confidentiality, integrity and availability
Readings
  • ISF Threat Horizon 2023: Security at a Tipping Point

Week 2: Authentication and Access Control

Videos
  • Access Control Methods
  • Introduction to Authentication and Access Control
  • Open Web Application Security Project (OWASP)
  • Access Control - Physical and Logical
  • Identification and AAA
Practice Exercise
  • Access Control
  • What is AAA?
  • Authentication and Access Control
Readings
  • OWASP Top 10 Project

Week 3: Windows Operating System Security Basics

Videos
  • File Systems
  • Shortcuts and Commands 
  • Welcome to operating systems fundamental
  • Additional Shortcuts
  • User and Kernel Mode
  • Directory Structure
Practice Exercise
  • Shortcuts and Commands
  • User and Kernel Modes
  • Windows Operating System Security Basics
  • File Systems and Directory Structure

Week 3: Linux Operating System Security Basics

Videos
  • File Systems
  • Permission and Owners
  • Key Components
  • Basic Commands
Readings
  • Hands-On Lab: Hardening Kali Linux Part 1
  • Hands-On Lab: Hardening Kali Linux Part 2
  • Pentesrmonkey research
Practice Exercise
  • Linux Operating System security basics
  •  File systems
  • Key Components
  • Linux Basic Commands

Week 3: MacOS Security Basics

Videos
  • macOS Recovery
  • macOS Auditing
  • macOS Security Settings
Reading
  • macOS Developer resources
Practice exercise
  • macOS Resources Knowledge Check

Week 4: Overview of Virtualization

Videos
  • What is Cloud Computing?
  • Virtualization module introduction
  • Wrap up
  • Virtualization to Cloud
  • Cloud Benefits, Security and Governance
  • An Overview of Virtualization
Practice Exercise
  • Virtualizations Basics
  • Virtualization Basics and Cloud Computing
Readings
  • SANS Institute research exercise

Admission details

The following steps need to be followed by the students for Cybersecurity Roles, Processes & Operating System Security:

Step 1: Go to the official page of the course.

Step 2: Click on “Enroll for Free” and choose the programme Cybersecurity Roles, Processes & Operating System Security.

Step 3: Select the option of a 7-days free trial.

Step 4: After 7-days of the trial, the candidate needs to pay the required fees.

Step 5: Once the transaction is completed, you will receive a confirmation of your enrollment. 

Scholarship Details

The scholarship is not granted for the Cybersecurity Roles, Processes & Operating System Security but the financial support is provided by Coursera. The candidates can look for support by selecting the link for the Financial Aid which can be found on the left side of the screen below the  “Enroll for Free” option. Further, candidates will have to fill in the application and once it is approved, they will receive a notification from Coursera.

How it helps

Together with IBM, Coursera has taken an initiative to create the Cybersecurity Roles, Processes & Operating System Security programme that focuses on the cybersecurity of the operating systems. This course will spread awareness about cyber threats and hackings among users. The demand for security analysts and security consultants has increased due to illegal practices in the cyber world. The hands-on projects will help in analyzing the challenges faced in cybersecurity and the solutions to overcome such challenges. 

The participants will learn the basic command practices which vary according to the operations of multiple operating systems. They would understand the concept of cloud computing and virtualization. The course would help the participants in studying the framework of different operating systems like Mac/OS, Mobile, Windows, and Linux. The participants would become vigilant about cyber threats and how to secure the organization and the system from illegal practices.

FAQs

How to claim for the badges?

Credly Acclaim will send an email notification to the participants with the instructions to claim the badge. After accepting the badge, it will become necessary for the participant to create a user account on Acclaim. 

Why is it necessary to create an account on Acclaim?

Through an account on Acclaim, the candidates can manage the badges, choose for other communications and features, and can also have the advantage of sharing the badges to social media platforms.  

How to have access to assignments and lectures?

Access would depend upon the type of enrollment of the candidate. By choosing the option “course in the audit”, a candidate can access the study material for free. The candidate needs to purchase the Certificate experience, to access graded assignments, and earn a Certificate.

What happens after purchasing the certificate?

After the candidate purchases the certificate, they get access to the study materials and graded assignments. When the course is completed, the candidate receives an e-certificate attached to his/her accomplishment page. They can add it to their LinkedIn profile. 

Similar Courses

Jump Start Network Security

Check Point Software Technologies Limited via Edx

4 Weeks Online
Beginner
Free

CompTIA Exam Prep

LearnQuest via Coursera

Online
Beginner
Free

CompTIA Practice

LearnQuest via Coursera

3 Weeks Online
Beginner
Free
Cisco Certified Network Associate 200 301 Training

Cisco Certified Network Associate 200 301 Training

Udemy

Online
Beginner
₹599 ₹3,099

International Security Management

Erasmus University, Rotterdam via Coursera

7 Weeks Online
Beginner
Free

Enterprise System Management and Security

CU Boulder via Coursera

5 Weeks Online
Beginner

Windows Server Management and Security

CU Boulder via Coursera

5 Weeks Online
Beginner

Proactive Computer Security

CU Boulder via Coursera

11 Hours Online
Beginner

Basic Network and Database Security

IBM via Edx

4 Weeks Online
Beginner
Free

Courses of your Interest

An Introduction To Coding Theory

An Introduction To Coding Theory

IIT Kanpur via Swayam

8 Weeks Online
Beginner
Free

C++ Foundation

PW Skills

5 Months Online
Beginner
Free

Advanced CFD Meshing using ANSA

Skill Lync

4 Weeks Online
Beginner
₹ 40,000

Salesforce Platform App Builder Certification Trai...

Simplilearn

12 Hours Online
Beginner

Data Science Foundations to Core Bootcamp

Springboard

7 Months Online
Beginner
$9,900 $13,900
Full Stack Developer Course With Placement

Full Stack Developer Course With Placement

AttainU

7 Months Online
Beginner
₹ 68,000
User Experience Design And Research

User Experience Design And Research

UM–Ann Arbor via Futurelearn

35 Weeks Online
Beginner
Fundamentals of Agile Project Management

Fundamentals of Agile Project Management

UCI Irvine via Futurelearn

21 Weeks Online
Beginner
Artificial intelligence Design and Engineering wit...

Artificial intelligence Design and Engineering wit...

CloudSwyft Global Systems, Inc via Futurelearn

17 Weeks Online
Beginner

More Courses by IBM

Artificial Intelligence Chatbots Without Programmi...

IBM via Edx

2 Weeks Online
Beginner
Free

R Programming Basics for Data Science

IBM via Edx

5 Weeks Online
Beginner
Free

Threat Intelligence Lifecycle Fundamentals

IBM via Edx

4 Weeks Online
Beginner
Free

Introduction to Data Engineering

IBM via Coursera

Online
Beginner

Introduction to the Threat Intelligence Lifecycle

IBM via Coursera

3 Weeks Online
Beginner
Free

Introduction to Devops

IBM via Coursera

Online
Beginner

Data Scientist Career Guide and Interview Preparat...

IBM via Coursera

3 Weeks Online
Beginner

Introduction to Software Programming and Databases

IBM via Coursera

Online
Beginner

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books