Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Cyber Defense Architecture

IBM via edX

Overview

With the cost of cyber breaches skyrocketing, robust cyber defense architecture is more critical than ever. Businesses need talented professionals with the right cyber defense skills! This course provides a comprehensive guide to detecting, responding to, and preventing cyberattacks across multiple security domains.

During the course, you’ll learn how to detect cyber threats using SIEM and XDR systems and utilizing advanced monitoring, analysis, and threat hunting techniques. You’ll gain insights into SOAR systems, automation, and orchestration, as well as breach notifications. You’ll build your understanding of IAM as the new perimeter of security and explore concepts like multifactor authentication (MFA) and privileged access management (PAM).

Additionally, you’ll delve into network security, looking at firewalls, VPNs, and SASE, alongside application security practices such as secure coding, vulnerability testing, and DevSecOps. Plus, you’ll learn about data security through governance, compliance, detection, and response strategies.

The course culminates in a hands-on final project where you'll design a secure network architecture and analyze real-world cybersecurity tools. Plus, a case study featuring IBM’s security solutions will deepen your understanding before you complete a final exam that will test your grasp of the fundamentals and key security concepts.

If you’re looking to build the job-ready skills in cyber defense architecture employers need, ENROLL TODAY and get ready to add in-demand skills to your resume in just 5 weeks!

Prerequisites: To enroll for this course you need to have a basic knowledge of networks, cloud computing, security concepts, and terminology.

Syllabus

Module 1: Cybersecurity Architecture Overview

  • Video: Course Introduction
  • Reading: General Information
  • Reading: Learning Objectives and Syllabus
  • Reading: Grading Scheme
  • Reading: Module Introduction and Learning Objectives
  • Video: Five Principles to Follow (and One to Avoid)
  • Reading: Key Takeaways: Five Principles
  • Reading: How to implement least privilege security
  • Activity: Apply the concept of least privilege
  • Video: Fundamentals of Confidentiality, Integrity, and Availability
  • Reading: Key Takeaways: CIA Fundamental
  • Reading: CIA Triad Infographic
  • Activity: Identify Compromised CIA Principles
  • Video: Roles and Tools
  • Reading: Key Takeaways: Roles and Tools
  • Reading: NIST CSF Framework
  • Module 1 Summary: Cybersecurity Architecture Overview
  • Practice Quiz: Cybersecurity Architecture Overview
  • Module 1 Glossary: Cybersecurity Architecture Overview
  • Module 1 Graded Quiz: Cybersecurity Architecture Overview

Module 2: Access Management and Endpoint Security

  • Reading: Module Introduction and Learning Objectives
  • Video: Who Are You? Identity and Access Management Really Wants to Know
  • Reading: Key Takeaways: IAM
  • Reading: Understanding Multi-factor Authentication
  • Activity: Apply Multi-factor Authentication
  • Video: Endpoints Are the IT Front Door - Guard Them
  • Reading: Key Takeaways: Endpoint Security
  • Reading: A Quick Tour of IBM Event Endpoint Management
  • Activity: Implementing Endpoint Management
  • Module 2 Summary: Access Management and Endpoint Security
  • Practice Quiz: Access Management and Endpoint Security
  • Module 2 Glossary: Access Management and Endpoint Security
  • Module 2 Graded Quiz: Access Management and Endpoint Security

Module 3: Network, Application, and Data Security

  • Reading: Module Introduction and Learning Objectives
  • Network Security
  • Reading: Key Takeaways: Network Security
  • Reading: Securing network infrastructure
  • Video: Lab Demo
  • Activity: Secure network diagram
  • Video: Application Security
  • Reading: Key Takeaways: Application Security
  • Reading: Secure coding practices
  • Video: Data Security
  • Reading: Key Takeaways: Data Security
  • Reading: Data Security: Why a proactive stance is best (IBM blog)
  • Reading: Quantum Safe Encryption
  • Module 3 Summary: Network, Application, and Data Security
  • Practice Quiz: Network, Application, and Data Security
  • Module 3 Glossary: Network, Application, and Data Security
  • Module 3 Graded Quiz: Network, Application, and Data Security

Module 4: Detection and Response

  • Reading: Module Introduction and Learning Objectives
  • Video: Cybersecurity Architecture: Detection
  • Reading: Key Takeaways: Detection
  • Reading: Indicators of compromise
  • Reading: Threat Intelligence
  • Activity: Review Recent Security Threat Reports using X-Force Threat Exchange
  • Video: Cybersecurity Architecture: Response
  • Reading: Key Takeaways: Response
  • Reading: Incident Response Frameworks
  • Activity: Incident Response
  • Reading: Case Study - Stopping cyberattacks at a major international airport
  • Module 4 Summary: Detection and Response
  • Module 4 Practice Quiz: Detection and Response
  • Module 4 Glossary: Detection and Response
  • Module 4 Graded Quiz: Detection and Response

Module 5: Final Project, Exam, and Course Wrap-Up

  • Final Project: Recommendations to Improve Network Security
  • Final Project Graded Quiz: Recommendations to Improve Network Security
  • Reading: Case Study: Network Architecture Powered by IBM
  • Reading: Course Glossary: Cyber Defense Architecture
  • Final Exam: Cyber Defense Architecture
  • Reading: Course Summary
  • Reading: Congratulations and Next Steps
  • Reading: Thanks from the Course Team

Taught by

Jeff Crume

Reviews

Start your review of Cyber Defense Architecture

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.