- Threat Intelligence Overview
- Threat Intelligence Strategy and External Sources
- Threat Intelligence Platforms1
- Threat Intelligence Frameworks
- Security Intelligence
Beginner
Online
5 Weeks
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
With the revolutionization of Digital technologies, they have become the backbone of every industry in today's world. But along with the revolution they have brought risks of cyberattacks. Threat intelligence knowledge helps one to track the threat and plan the defence against them. The Cyber threat intelligence training course provides knowledge and understanding as to who is attacking, their strength and abilities as to how much damage they can create to the system.
To keep a track of their network and data they opt for a solution which is a cyber threat intelligence which can address all the issues that they are prone to. This Cyber threat intelligence online course is specially designed for beginners who are willing to gain knowledge using this platform and aim for a bright future by upgrading their portfolio and skills. The learners will be able to stand in the competition that is prevailing in the industry and will be able to stand out of the crowd.
The highlights
- 100% online learning
- Flexible deadlines
- Favorable for beginners
- Offered by IBM
- 7-day free trial available.
Program offerings
- Assignments
- Quizzes
- Readings
- Projects
Course and certificate fees
fees details:
Particulars | Amount |
Course Fee, 1 Month | Rs. 4,023 |
Course Fee, 3 Month | Rs. 8,046 |
Course Fee, 6 Month | Rs. 12,069 |
certificate availability
certificate providing authority
Eligibility criteria
Work experience
There Is no experience level required for the course.
Certification qualification details
The candidate needs to complete the programme successfully to get the certification of completion.
What you will learn
- The candidate will easily be able to identify all the key concepts that likely to hinder cyber intelligence
- The candidate will understand how all the scanning technologies work and are used for cybersecurity
- They will be able to explore SIEM products and review all the suspicious alerts ang effectively take action upon them.
- They will easily be able to classify data in the database environment by using a data loss prevention tool.
Who it is for
Admission details
Filling the form
The admission process of Cyber Threat Intelligence certification is very simple and easy to follow.
Step 1: Firstly visit https://www.coursera.org/learn/ibm-cyber-threat-intelligence to apply for the programme
Step 2: Click on Enroll for free tab and go ahead with signing up via Facebook or Google ID
Step 3: The candidate post signing up can enroll in the desired programme and access 7 days for free
Step 4: When 7 days are over, candidates need to make the payment per month for the programme.
The syllabus
Week 1: Threat Intelligence
Videos
Readings
- Earn an IBM digital badge
- IBM Global Subject Matter Experts
- Threat Intelligence Sources
Practice Exercise
- Threat Intelligence and Cybersecurity Knowledge Check
- Threat Intelligence Framework Knowledge Check
- Threat Intelligence Graded Assessment
Week 2: Data Loss Prevention and Mobile Endpoint Protection
Videos
- What is Data Security and Protection
- Data Security Top Challenges
- Data Security Common Pitfalls
- Industry-Specific Data Security Challenges
- Capabilities of Data Protection
- Critical Data Protection Capabilities
- Data Protection - Industry Example
- Mobile Endpoint Protection
Readings
- Apply for Data Protection
- Apply for Mobile Endpoint Protection
Practice Exercise
- Data Security and Protection Knowledge Check
- Mobile Endpoint Protection Knowledge Check
- Data Loss Prevention and Mobile Endpoint Protection Graded Assessment
Week 3: Scanning
Videos
- Vulnerability Assessment Tools
- Port Scanning
- Network Protocol Analyzers Overview
Readings
OWASP Vulnerability Tools Listing
Practice Exercise
- Vulnerability Tools Knowledge Check
- Port Scanning Knowledge Check
- Network Protocol Analyzers Knowledge Check
- Vulnerability Assessment Tools Graded Assessment
Week 3: Application Security and Testing
Videos
- Characteristics of a Security Architecture.
- High-level Architectural Models
- Solutions Architecture
- Security Patterns
- Application Security Overview
- Application Security Threats and Attacks
- Application Security Standards and Regulations
- DevSecOps Overview
- DevSecOps Deployment
- Application Security Defects - Writing Secure Code
- Cross-Site Scripting - Common Attacks
- Cross-Site Scripting - Effective Defenses
Readings
Agile Manifesto
Practice Exercise
- Security Architecture Considerations Knowledge Check
- Application Security Techniques and Risks Knowledge Check
- DevSecOps & Security Automation Knowledge Check
- Deep Dive into Cross-Scripting Knowledge Check
- Application Testing Graded Assessment
Week 4: SIEM Platforms
Videos
- SIEM concepts and Benefits
- SIEM Deployment
- SIEM Solutions - Vendors
- QRadar SIEM - An Industry Example
- User Behavior Analytics
- AI and SIEM4m
- AI and SIEM - An Industry Example
Readings
- Applying SIEM concepts
- Applying User Behavior Analytics
- AI and Cybersecurity
- Applying Artificial Intelligence to SIEM
- Want to learn more about Cybersecurity and AI?
Practice Exercise
- SIEM Concepts Knowledge Check
- Artificial Intelligence in SIEMs Knowledge Check
- SIEM Platforms Graded Assessment
Week 5: Threat Hunting
Videos
- Fight and Mitigate Upcoming Future Attacks with Cyber Threat Hunting
- SOC Cyber Threat Hunting
- Cyber Threat Hunting – An Industry Example
Readings
- Apply your knowledge of Threat Hunting
- Cybersecurity OPS Terminal: A Cyber Breach Game Experience
Practice Exercise
- Threat Hunting Overview Knowledge Check
- Threat Hunting Graded Assignment
Scholarship Details
Currently, the candidate can apply for financial aid if he/she is not able to pay for the fees.
How it helps
The Cyber Threat Intelligence classes course by Coursera offered by IBM. This is a beginner level course that looks after the learning needs of the candidates with basic knowledge. The candidate can apply for multiple specializations and professional certified programmes by doing this course. After successfully completing this course their learning would count for either IBM Cybersecurity Analyst Professional Certificate or Security Analyst Fundamentals Specialization programme.
When the course is completed, the candidate will get a certificate that can be shared on different platforms and alongwith their CVs. You can take a 7-day free trial and decide if you want to pursue it further or not.
Cyber Threat Intelligence course is flexible and beneficial for the candidates as they can learn at their own pace. Graded quizzes and assignments are also available along with course readings and videos. Candidates can get access to most of the course material and ungraded assignments for free.
FAQs
Coursera is only the facilitator for imparting the programme. The candidates cannot get a job after completing the programme
After a 7 days free trial programme, the candidate needs to pay the amount. But since 7 days are already given for free to try the course, the refund will not be given.
There are no particular age requirements to apply for this programme.
The course Cyber Threat Intelligence needs to be successfully completed and submitted. Post that the candidates will get the certificate of completion of the programme.
Articles
Popular Articles
Latest Articles
Similar Courses
Threat Intelligence Lifecycle Fundamentals
IBM via Edx
Information Technology Fundamentals for Business P...
Polytechnic University of Valencia, Valencia via Edx
Introduction to the Threat Intelligence Lifecycle
IBM via Coursera
Introduction to Cybersecurity Essentials
IBM via Coursera
Check Point Jump Start Cloud Security
Check Point Software Technologies Limited via Coursera
Cybersecurity and Privacy in The Internet of Thing...
Curtin University, Perth via Edx
Cyber Security Certification
Board Infinity
Healthcare Data Security Privacy and Compliance
Johns Hopkins via Coursera
Digital Security Training Cyber Threats and Risk M...
Coventry University, Coventry via Futurelearn
Courses of your interest
C++ Foundation
PW Skills
Data Science Foundations to Core Bootcamp
Springboard
User Experience Design And Research
UM–Ann Arbor via Futurelearn
Data Analysis with Excel for Complete Beginners
CloudSwyft Global Systems, Inc via Futurelearn
Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
Data Science Fundamentals on Microsoft Azure
CloudSwyft Global Systems, Inc via Futurelearn
Artificial Intelligence Projects
Great Learning
More Courses by IBM
R Programming Basics for Data Science
IBM via Edx
Introduction to Data Engineering
IBM via Coursera
Relational Database Administration
IBM via Coursera
Introduction to Web Development with HTML CSS Java...
IBM via Coursera
Introduction to Devops
IBM via Coursera
Data Scientist Career Guide and Interview Preparat...
IBM via Coursera
Data Analyst Career Guide and Interview Preparatio...
IBM via Coursera
Introduction to Software Programming and Databases
IBM via Coursera
Introduction to Networking and Storage
IBM via Coursera