Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Cybersecurity Architecture

IBM via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In today's digital world, cyberattacks are aimed at stealing sensitive information or holding data hostage. Cybersecurity Ventures predicts that by 2031, a ransomware attack will occur every two seconds, compared to one every eleven seconds in 2021. This growing frequency underscores the urgent need for skilled cybersecurity professionals. If you are starting a career as a cybersecurity analyst or are simply curious about how cybersecurity works, join us on this five-week journey through Cybersecurity Architecture. You will learn from a distinguished cybersecurity engineer who also teaches as an adjunct professor at a local university. This course is designed for anyone interested in gaining a solid understanding of cybersecurity. It covers fundamental topics such as the five security principles, the CIA triad, Identity and Access Management (IAM), endpoint security, and key security domains. You will also learn about detection and response concepts and tools, giving you a complete view of prevention, detection, and response. Throughout the course, you will have opportunities to apply what you learn through practical activities and labs, and to test your knowledge with quizzes across different modules. Come and explore the world of cybersecurity.

Syllabus

  • Cybersecurity Architecture Overview
    • In this module, you will be introduced to fundamental principles of cybersecurity including defense in depth, least privilege, separation of duties, security by design, Keep It Simple, Stupid (KISS). You will also be introduced to bad practice Security by Obscurity that can lead to cyberattacks. Next, you will be able to recognize the importance and key concepts related to Confidentiality, Integrity, and Availability, or the CIA Triad. Finally, you will become familiar with roles and how to manage the role security.
  • Access Management and Endpoint Security
    • This module introduces Identity and access management (IAM) and endpoints. IAM is one of the security domains and is referred to as the new perimeter. You will learn about the LDAP and the 4 A’s of IAM including administration, authorization, authentication, and audits. After a brief discussion on Privileged access management (PAM), you will be introduced to the concepts of multifactor authentication (MFA) and single sign on (SSO). You will also learn about endpoints, which is another key security domain. After learning the definition of an endpoint, you will be introduced to endpoint management systems, which help control the endpoints.
  • Network, Application, and Data Security
    • In this module, you will be introduced to security in the network, application and data domains. As part of the network security domain, you will gain insight into firewall concepts, such as packet filter, stateful packet inspection, and proxy. You will also be introduced to security concepts associated with segments and VPNs, and SASE. Moving to the Application security domain, you will get familiar with the phases when security vulnerabilities creep in along with best practices for secure coding along with introduction of vulnerability testing. The concept of DevSecOps, Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) will also be introduced. This module will conclude with concepts associated with data security including governance, discovery, compliance, detection, and response.
  • Detection and Response
    • In this module, you will learn about detecting cyberattacks and responding to them. This module will introduce you to security being the sum of prevention, detection, and response. You will be introduced to detection using the security information and event management (SIEM) system or extended detection response (XDR) system detection techniques to perform tasks such as monitoring, analyzing, reporting, and threat hunting. You will also get an overview of the SIEM process followed by the XDR process and how SIEM and XDR work together. Further, you will be introduced to federated search. This module will also cover how to respond to cyberattacks. You will become familiar with the SOAR system and also understand how automation and orchestration differ. Finally, you will be introduced to breach notifications.
  • Final Project, Exam, and Course Wrap-Up
    • In this module, you will complete a final project where you will have an opportunity to demonstrate your proficiency in designing a secure network architecture. Next, a case study will help you understand the different security tools from IBM. Finally, the final exam will test your knowledge of the course’s content including cybersecurity fundamentals and security domains.

Taught by

Jeff Crume

Reviews

4.8 rating at Coursera based on 196 ratings

Start your review of Cybersecurity Architecture

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.