- NIST Incident Response Lifecycle - Teams
- NIST Incident Response Lifecycle
- What is a Breach?
- Target Attack Timeline
- IBM X-Force IRIS Cyberattack Framework
- Target Attack Vulnerabilities
- Watering Hole Attack
Beginner
Online
4 Weeks
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
The use of computer systems to store and share data has led to the threat of cyber-attack and unauthorized access to sensitive data. This has given birth to a new branch in information technology which is named as Cybersecurity. Cybersecurity deals with the practices and processes that are made to protect data, devices, networks, and applications from damage and unofficial access.
The Cybersecurity Capstone: Breach Response Case Studies programme will provide a platform to the candidate, to attain necessary skills to work as a professional research analyst in Cybersecurity. By taking up the course, the participant will be exploring the methodologies related to incident response and the models of the security.
They will be getting insights, to categorise and recognise various important types of attacks and vulnerabilities at their workplace. Also, they will be exploring the breaches that happened in the recent past, to understand the process of identification of the threat and measures taken by the organisation to combat the threat and reduce its risks in future.
The participants will be provided with a project wherein they will be selecting a breach in cyber security, carry out analysis of the timeline of the attack, the effect of an attack on systems, by applying their knowledge and skills. The Cybersecurity Capstone: Breach Response Case Studies training course is for anyone who wants to learn the basics of cybersecurity and gradually attain expertise.
The highlights
- Offered by IBM
- 100% online
- Flexible deadline
- Subtitles in English
- Shareable certificate
- Experiential learning by peer learning projects
Program offerings
- Practice exercise
- Pre-recorded videos
- Quizzes
- Reading material
Course and certificate fees
One can start the course by getting a subscription to Coursera. A free trial of 7 days will be provided, after which the candidate will be charged Rs. 4,023 on monthly basis.
Fee details of Cybersecurity Capstone: Breach Response Case Studies
Head | Amount |
1 Month | Rs. 4,023 |
3 Months | Rs. 8,046 |
6 Months | Rs. 12,069 |
certificate availability
certificate providing authority
What you will learn
The participants will master the following skills:
- Describing ransomware threats and its repercussion on the organisation.
- Describing water hole attack after research.
- Applying methodologies of incident response.
- Explaining breaches by the third party along with its consequences.
- Report the point of sale attack and approximate the cost in case of data breaches.
- Understand the consequences of the phishing effect.
- Making a case study report on recent breach and cyber-attack.
Who it is for
Admission details
Step 1: Visit the website of Coursera and choose the course- Cybersecurity Capstone: Breach Response Case Studies
https://www.coursera.org/learn/ibm-cybersecurity-breach-case-studies#
Step 2: To have complete access to the course material for 7 days, click on the hyperlink ‘Enroll for free’
Step 3: A pop up window will appear, read the details and click on ‘Start free trial’.
Step 4: Enter the details including card number, name on the card, expiry date, CVV, and name of the country will be asked to the candidate.
Step 5: Get started with 7 days of free trial after entering the required details.
The syllabus
Week 1: Incident Management Response and Cyber Attack Frameworks
Videos
Readings
- Course introduction
- Earn an IBM digital badge
- Apply Incident Response
- X-Force Command Center
- X-Force Threat Intelligence Index 2023
Practice exercises
- Incident Management Knowledge Check
- Cyberattack Frameworks Knowledge Check
- Case Studies Knowledge Check
- Incident Management Response and Cyberattack Frameworks Graded Assessment
Week 2: Point of Sale Breach
Videos
- Point of Sale Breach Overview
- PoS Case Study - Home Depot
- PoS Malware
Readings
- PoS Skimming
- The Cyber Kill Chain in PoS Breaches
Practice exercises
- Introduction to Point of Sale Attacks Knowledge Check
- PoS Case Study: Home Depot Knowledge Check
- Point of Sale Breach Graded Assessment
Week 2: Phishing Scams
Videos
- Phishing Scams Overview
- Impact of Phishing
- Phishing Email Study
- Phishing Case Study: Google & Facebook
Readings
- Exploring Steps to Recovery
- Can You Spot the Difference?
Practice exercises
- Introduction to Phishing Scams Knowledge Check
- Phishing Case Study Knowledge Check
- Phishing Scams Graded Assessment
Week 3: Ransomware
Videos
- Ransomware Overview
- Examples of Ransomware
- Ransomware Case Study - City of Atlanta
Readings
- Emerging Trends in Ransomware
- Ransomware of Things
Practice exercises
- Ransomware Knowledge Check
- Ransomware Case Study Knowledge Check
- Ransomware Graded Assessment
Week 3: 3rd Party Breach
Videos
- 3rd Party Breach Overview
- 3rd Party Breach - Quest Diagnostics
- 3rd Party Breach Impacts
Readings
- List of 3rd Party Breaches
- Breach Plan
Practice exercises
- Third-Party Breach Knowledge Check
- Third-Party Breach Graded Assessment
Week 4: Apply Your Skill - Data Breaches
Videos
- Introduction to the Peer-to-Peer Applied Project - Data Breaches
Scholarship Details
Financial aid is provided in which the participant will get access to all the learning material and certification. One can apply for financial aid by following the steps given below:
- Visit the official site of Coursera https://www.coursera.org/learn/ibm-cybersecurity-breach-case-studies#
- Click on the tab containing hyperlink which states ‘Financial help available.
- A pop-up window will appear, wherein the participants will be provided with options like Enroll and start learning today or continue the application (for getting financial aid).
- If the participant chooses to get any financial aid, then they need to choose the option-Continue the application.
- There will be terms and conditions with check box bullets. The participant needs to tick the bullets to accept the terms and conditions.
- Further, an application form will appear where the candidate will be asked for the background information and some of the descriptive questions.
- After answering all the questions, the candidate need to click on Submit application
- It may take around 15 days for the review of the application, after which the candidate will be informed further.
How it helps
Cybersecurity has emerged as a key area for job and career growth. Cybersecurity certification seems the most brilliant and viable career option in information technology. With the emergence of concepts like big data, IoT, and cloud computing the magnitude of the importance of cybersecurity has increased immensely. Apart from this, Cybersecurity Capstone: Breach Response Case Studies classes course offers a global exposure to applicants where the expert can travel overseas to serve their skills.
As cyber-crimes are increasing day by day, cybersecurity withholds due importance in order to maintain availability, confidentiality, and integrity of the data. By helping police forces and national crime agencies one can do a greater good to the country too. This makes the cybersecurity job as most rewarding and satisfying.
In the Cybersecurity Capstone: Breach Response Case Studies programme the participants will be exploring the framework of cyber-attack and response during incident management. They will get an opportunity to conduct a case study on two corporations who have suffered phishing attacks. They will also learn the impact of point of sale breaches on the organisation through case studies. They will be choosing a particular company, to identify data breaches, susceptibility, and its cost to the company by applying their knowledge and skills.
FAQs
The access to assignments and lectures depends on the type of enrolment chosen by the entrant. If s/he chooses to audit the course, then s/he can only view the free course material. To get access to graded assignments, the participants have to purchase the certificate during or after the audit.
The participants are provided with videos, practice exercise, reading material along with assignments and quizzes as a part of the assessment.
As the course is a subset of various other courses, it is being applied to various professional certificate and Specialisation programmes. Successful completion of the course will be considered while applying for other courses like IBM Cybersecurity Analyst Professional Certificate and Security Analyst Fundamentals Specialization.
On subscribing to Coursera, there is a deduction of fees every month. After the free trial of seven days ends, the candidate will be charged monthly fees by auto-deduction, if s/he forgets to cancel the subscription. Although, the participant can cancel the subscription at any time to avoid deductions from the following month.
Yes, the participant is free to enrol for more than one course at a time.
There is an availability of financial aid. To apply, the participant needs to fill up an application form and they will be intimated about the status after about 15 days.
No, there is no provision of language options other than English.
The course is being instructed by IBM Global Subject Matter Experts working in IBM Security Learning Services. The teaching is rated 4.5/5 by the previous candidates of the course.
After subscribing to Coursera, the candidate will receive the certificate after successful completion of the course. As the certificate is in electronic form, it provides an ease to share it online, and link it to CV and LinkedIn profile. In case the candidate opts for the audit the course then there will be no provision of the certificate.
Articles
Popular Articles
Latest Articles
Similar Courses
Threat Intelligence Lifecycle Fundamentals
IBM via Edx
Information Technology Fundamentals for Business P...
Polytechnic University of Valencia, Valencia via Edx
Introduction to the Threat Intelligence Lifecycle
IBM via Coursera
Introduction to Cybersecurity Essentials
IBM via Coursera
Check Point Jump Start Cloud Security
Check Point Software Technologies Limited via Coursera
Cybersecurity and Privacy in The Internet of Thing...
Curtin University, Perth via Edx
Cyber Security Certification
Board Infinity
Healthcare Data Security Privacy and Compliance
Johns Hopkins via Coursera
Digital Security Training Cyber Threats and Risk M...
Coventry University, Coventry via Futurelearn
Courses of your interest
C++ Foundation
PW Skills
Data Science Foundations to Core Bootcamp
Springboard
User Experience Design And Research
UM–Ann Arbor via Futurelearn
Data Analysis with Excel for Complete Beginners
CloudSwyft Global Systems, Inc via Futurelearn
Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
Data Science Fundamentals on Microsoft Azure
CloudSwyft Global Systems, Inc via Futurelearn
Artificial Intelligence Projects
Great Learning
More Courses by IBM
R Programming Basics for Data Science
IBM via Edx
Introduction to Data Engineering
IBM via Coursera
Relational Database Administration
IBM via Coursera
Introduction to Web Development with HTML CSS Java...
IBM via Coursera
Introduction to Devops
IBM via Coursera
Data Scientist Career Guide and Interview Preparat...
IBM via Coursera
Data Analyst Career Guide and Interview Preparatio...
IBM via Coursera
Introduction to Software Programming and Databases
IBM via Coursera
Introduction to Networking and Storage
IBM via Coursera