Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Cybersecurity Capstone and Case Studies

IBM via edX

Overview

Ready to power up your portfolio with real-world experience in cybersecurity analysis that employers look for? This capstone course will have you analyzing a cybersecurity challenge like a pro and giving you hands-on experience dealing with a breach response you can talk about in interviews.

During this course, you’ll be immersed in the core principles and practices of breach response and cybersecurity management. You’ll dive into phishing, vishing, point-of-sale (PoS) breaches, insider threats, AI-related breaches, ransomware attacks, and how attackers exploit vulnerabilities. You’ll also explore how organizations respond to these incidents and implement strategies to prevent future threats.

Guided by industry experts, you’ll then get hands-on working on incident response, digital forensics, penetration testing, and compliance. Through engaging case studies and structured templates, you’ll develop critical skills in breach management, plus you’ll propose enhancements to real-world response strategies.

If you’re looking to gain the practical experience employers look for and expand your expertise, ENROLL TODAY and get ready to boost your resume in just 6 weeks.

Syllabus

Syllabus

Welcome

  • Video: Course Introduction
  • Reading: Helpful Tips for Course Completion
  • Reading: General Information
  • Reading: Learning Objectives and Syllabus
  • Reading: Grading Scheme

Module 1: Analyzing Case Study Layouts and Phishing Case Studies

  • Reading: Module Introduction and Learning Objectives
  • Video: Exploring Case Studies
  • Video: How to Analyze Case Studies
  • Reading: Effective Layout for Analyzing Case Studies
  • Video: Overview of Phishing Scams
  • Reading: Can You Spot the Difference
  • Reading: Cisco Cyberthreat Trends Report
  • Video: Phishing Case Study: Google and Facebook
  • Reading: Analyzing the Facebook and Google Case Study
  • Video: Vishing Case Study: South Korean Doctor
  • Activity: Identifying and Responding to Phishing Attacks
  • Practice Quiz: Analyzing Case Study Layouts and Phishing Case Studies
  • Reading: Summary and Highlights: Analyzing Case Study Layouts and Phishing Case Studies
  • Graded Assignment: Graded Quiz: Analyzing Case Study Layouts and Phishing Case Studies

Module 2: Analyzing PoS and Insider Breach Case Stu dies

  • Reading: Module Introduction and Learning Objectives
  • Video: Overview of PoS Breaches
  • Video: PoS Malware and Skimming
  • Video: PoS Case Study: Target
  • Reading: Cyber Kill Chain Analysis of the Target Breach
  • Video: Home Depot Point of Sale (PoS) Case Study
  • Activity: Analyzing the Home Depot Case Study
  • Video: Overview of Insider Breaches
  • Video: Insider Threat Detection
  • Reading: Mitigating Insider Threats
  • Video: Insider Breach Case Study: Vault 7
  • Video: Insider Breach Case Study: Pegasus Airlines
  • Activity: Analyzing the Pegasus Airlines Case Study
  • Practice Quiz: Analyzing PoS and Insider Breach Case Studies
  • Reading: Summary and Highlights: Analyzing PoS and Insider Breach Case Studies
  • Graded Quiz: Analyzing PoS and Insider Breach Case Studies

Module 3: Analyzing AI-Related Breaches and Ransomware Case Studies

  • Reading: Module Introduction and Learning Objectives
  • Video: Overview of AI-Related Breaches
  • Reading: The Emerging Impact of AI on Data Breaches
  • Video: AI-Related Breach Case Study: Deepfake Conference Call
  • Activity: Analyzing the Deepfake Case Study
  • Video: Notable AI-Related Breaches
  • Video: Overview of Ransomware Breaches
  • Reading: Emerging Trends in Ransomware
  • Video: Ransomware Case Study: City of Atlanta
  • Video: Ransomware Case Study: Colonial Pipeline
  • Activity: Navigating Through a Ransomware Attack
  • Practice Quiz: Analyzing AI-Related Breaches and Ransomware Case Studies
  • Reading: Summary and Highlights: Analyzing AI-Related Breaches and Ransomware Case Studies
  • Graded Quiz: Analyzing AI-Related Breaches and Ransomware Case Studies

Module 4: Analyzing Incident Response and Digital Forensics Case Studies

  • Reading: Module Introduction and Learning Objectives
  • Video: Overview of Incident Response
  • Video: Incident Response Case Study: Google Home
  • Video: Incident Response Case Study: Lightning Strikes
  • Activity: Analyzing the Lightning Strikes Case Study
  • Reading: When Incident Response Goes Wrong
  • Video: Overview of Digital Forensics
  • Video: Digital Forensics Case Study: Bernard Madoff
  • Video: Digital Forensics Case Study: U.S. v. Ganias
  • Activity: Responding to a Digital Forensics Warrant
  • Reading: Digital Forensics Gone Wrong
  • Practice Quiz: Analyzing Incident Response and Digital Forensics Case Studies
  • Reading: Summary and Highlights: Analyzing Incident Response and Digital Forensics Case Studies
  • Graded Quiz: Analyzing Incident Response and Digital Forensics Case Studies

Module 5: Analyzing Penetration Testing and Compliance Case Studies

  • Reading: Module Introduction and Learning Objectives
  • Video: Overview of Penetration Testing
  • Video: Penetration Testing Case Study: Equifax
  • Video: Penetration Testing Case Study: X-Force Red
  • Activity: Analyzing the IBM X-Force Red Case Study
  • Video: Overview of Compliance
  • Video: Compliance Case Study: Marriott
  • Video: Compliance Case Study: Equiniti
  • Activity: Analyzing the Equiniti Case Study
  • Practice Quiz: Analyzing Penetration Testing and Compliance Case Studies
  • Reading: Summary and Highlights: Analyzing Penetration Testing and Compliance Case Studies
  • Graded Quiz: Analyzing Penetration Testing and Compliance Case Studies

Module 6: Final Project

  • Reading: Module Introduction and Learning Objectives
  • Reading: About the Course Project
  • Video: Introduction to the Peer-to-Peer Applied Project: Analyzing a Data Breach
  • Final Project: Applied Project: Analyzing a Data Breach
  • Final Project: Submission and Evaluation

Course Wrap-Up

  • Video: Course Wrap-up
  • Reading: Congratulations and Next Steps
  • Reading: Team and Acknowledgments
  • Copyrights and Trademarks

Course Rating

  • Course Rating and Feedback

Badge

  • Claim Your Badge Here + FAQ

Taught by

Skills Network

Reviews

Start your review of Cybersecurity Capstone and Case Studies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.