Introduction to Cybersecurity Tools & Cyberattacks

This course is part of multiple programs. Learn more

Instructors: IBM Skills Network Team +1 more

Instructor ratings

We asked all learners to give feedback on our instructors based on the quality of their teaching style.

What you'll learn

  •   How to apply key cybersecurity concepts, tools, and methodologies to protect digital and physical assets
  •    How to recognize various types of threat actors and malware and explore preventive measures
  •    To identify various internet security threats and common cybersecurity best practices
  •   To understand authentication and identity management concepts for safeguarding your organization
  • Skills you'll gain

  •   Network Security
  •   Authorization (Computing)
  •   Security Awareness
  •   Malware Protection
  •   Threat Management
  •   Multi-Factor Authentication
  •   Infrastructure Security
  •   Cyber Attacks
  •   Authentications
  •   Identity and Access Management
  •   Incident Response
  •   Cybersecurity
  •   Threat Detection
  •   Security Controls
  •   Distributed Denial-Of-Service (DDoS) Attacks
  •   Computer Security Incident Management
  • There are 5 modules in this course

    In this course, you’ll explore the evolution of cybersecurity and discover the critical thinking model. You’ll also cover threat actors, malware, ransomware, and defenses against social engineering. Additionally, you’ll learn about internet security threats and security controls. You’ll explore the fundamentals of identity and access management (IAM), authentication, and access control. You’ll also look at the physical threats organizations encounter and consider effective security measures. Throughout, you’ll build practical knowledge through hands-on labs and gain technical expertise through insights from industry experts. Your final project will enable you to effectively demonstrate your understanding of cybersecurity principles. This course is for anyone who wants a basic understanding of cybersecurity and is part of a series designed to help you start a career as a Cybersecurity Analyst.

    Cybersecurity Threats

    Cybersecurity Controls

    Identity and Physical Controls

    Final Project and Course Wrap-Up

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved