- What cybersecurity challenges do organizations face?
- SOC reports - auditor process overview
- Introduction to this course
- SOC reports
- Compliance basics
- General data protection regulation (GDPR) overview
- Health Insurance Portability And Accountability Act (HIPAA)
- International organization for standardization (ISO) 2700x
- What will you learn in this module?
- Payment card industry data security standard (PCI DSS)
- Overview of US cybersecurity federal law
- National Institute of Standards and Technology (NIST) Overview
- American Institute of CPAs (AICPA) website research
Cybersecurity Compliance Framework & System Administration
Meet the key requirements of your role in the cybersecurity domain with Client System Administration, Server Administration and Cryptography by Coursera.
Beginner
Online
₹ 4,070
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
In this data-driven world, cybercrimes are not unknown to anybody. Cyber offenders seamlessly carry out crimes beyond jurisdictions and on an online interface that is likely to trap anybody. Thus, cybersecurity mandates prove to be a golden weapon at the hands of companies and organisations with huge and sensitive databases. Cybersecurity professionals need to be a step further than offenders and henceforth require holistic knowledge of concepts.
Cybersecurity Compliance Framework & System Administration Certification by Coursera fulfills that requirement and gives course participants the background to understand industry standards and key cybersecurity compliances. The knowledge provided throughout will prove to be beneficial for learners irrespective of the role they wish to partake in an organisation.
Candidates will get a strong grasp of the basic commands for a user and server administration related to security. Endpoint security and patch management have also been sufficiently dealt with. Finally, learners will know more about the in-depth skills around encryption and cryptography to understand their effect on the software. The intended audience of this Cybersecurity Compliance Framework & System Administration training course comprises those wishing to acquire a basic understanding of Compliance, Security Frameworks, endpoint management, cryptography, or encryption.
The highlights
- Sixteen hours for completion
- Shareable certificate
- Seven-day free and full access to course material
- No prior experience required
- Offered by IBM
- Flexible deadlines
Program offerings
- Graded quizzes
- Course videos
- Assignments
- Readings
Course and certificate fees
Fees information
Cybersecurity Compliance Framework & System Administration
Particulars | Fee Amount in INR |
Introduction to Git and GitHub (audit only) | Free |
Introduction to Git and GitHub - 1 month | Rs. 4,074/- |
Introduction to Git and GitHub - 3 months | Rs. 8,149/- |
Introduction to Git and GitHub - 6 months | Rs. 12,224/- |
certificate availability
certificate providing authority
Eligibility criteria
Certification qualifying details
Cybersecurity Compliance Framework & System Administration training programme is a three-step process, the first step of which is name/identity verification through a registered account. The second requirement requires a passing grade in all the graded assignments (the course passing threshold should be crossed if the present course is a cumulative graded course). The last and final step is the payment of the certification fee after seven days unless they have been granted financial aid.
What you will learn
Cybersecurity Compliance Framework & System Administration Classes course brings authentic and exhaustive education of cybersecurity compliances to the comfort of candidates’ computers with hands-on exercises. After completion, participants will find themselves well-versed with key fundamentals including-
- Candidates can understand the differences between endpoint protection and detection
- They will study how user management is carried out for Linux and Windows
- They will understand the security vulnerabilities in Windows and Linux
- Learners will also be aware of the common pitfalls faced with respect to cryptography by organisations while developing products
- They will get an overview of the roles, functions and designs of user and server administration
- They shall be able to understand the concept of endpoint protection and patching as concerned with client system administration
- In this course, learners will know everything about encryption, hashing, digital certificates and encoding with respect to cryptography
- They will be adept in listing and describing key cybersecurity compliance and industry standards like NIST, HIPAA, GDPR, PCI and SANS
Admission details
Admissions for Cybersecurity Compliance Framework & System Administration Certification Training can be made via the course URL. The procedure for admissions has been mentioned below-
Step 1: Visit the given link- https://www.coursera.org/learn/cybersecurity-compliance-framework-system-administration
Step 2: Select “Enroll for Free”.
Step 3: Click "Next" after confirming the name of the course from the list.
Step 4: You can now pursue the course immediately if you are signed in on Coursera. Register or sign in if otherwise.
The syllabus
Week 1: Compliance Frameworks and Industry Standards
Videos
Readings
- About this course
- Earn an IBM digital badge
- Center for internet security (CIS) critical security controls
- Examples of GDPR fines
- Compliance and industry standards summary
- Center for internet security (CIS) critical security controls
- National Institute of Standards and Technology (NIST) special publication 800-53 catalogue of security controls
- HIPAA cybersecurity guidance
Practice exercises
- Compliance and regulations for cybersecurity
- Industry standards
- System and Organization Controls Report (SOC) overview
- CIS critical security controls
- Compliance frameworks and industry standards
Week 2: Client System Administration, Endpoint Protection and Patching
Videos
- Endpoint protection
- Unified endpoint management
- Endpoint detection and response
- Windows patching
- Introduction to client system administration, endpoint protection and patching
- Client system administration
- Overview of patching
Readings
- 4 social engineering threats to keep an eye on — and how to stop them
- Endpoint protection - additional vendor solutions
- Unified endpoint for dummies
- Patch management best practices
Practice exercises
- Patching
- Client system administration, endpoint protection and patching
- Client system administration and endpoint protection
Week 3: Server and User Administration
Videos
- Exploring the shell
- Demonstration of samba installation and configuration
- User and kernel modes
- Linux basic commands- part 1
- Introduction to Linux
- Linux run levels
- Local user accounts
- Files systems
- Linux internal and external commands
- Linux basic commands part 3
- Directory structure
- Role-based access control and permissions
- Overview of server management with windows admin centre
- Features of active directory
- Linux basic commands- part 2
- Windows auditing overview
- Welcome to user and server administration
- Kerberos authentication and logs
- Linux file systems and directory structure
- Windows 10 security app
- Active directory accounts and security considerations
Readings
- CIS controls Microsoft windows 10 cyber hygiene guide
- Beginning your General Data Protection Regulation (GDPR) journey for windows server
- Securing privileged access against threats
Practice exercises
- Windows administration
- Server and user administration
- Linux basics
Week 4: Cryptography and Compliance Pitfalls
Videos
- Check out what is in this cryptography module
- Thank you
- Key takeaways -cryptography and encryption
- Hashing
- Cryptography- the basics
- Encrypting data in transit
- Common cryptography pitfalls
- Safeguarding encryption keys
- Encrypting data at rest
- Cryptography- an introduction
- Impact of quantum computing
- Digital signature reading - National Institute of Standards and Technology (NIST)
- Encrypting data in use
Readings
- Additional cryptography and encryption examples
- Additional review of cryptographic exposures
- Additional quantum computing research
- Cryptographic weaknesses
- Digital signatures
Practice exercises
- Cryptography and compliance pitfalls
- Cryptography basics
Scholarship Details
Cybersecurity Compliance Framework & System Administration Online Certification is a paid feature so learners with financial constraints desiring the certification can apply for financial aid through their course URL wherein they need to click on “Learn more and apply” next to “Information about Financial Aid or Scholarships” option. After doing as directed on resulting web pages, candidates have to click on “Continue” to complete their 150-word application wherein they have to enter the minimum fee that they can afford, their annual income, a short note on how they will utilise the learning outcomes, educational specifications, present employment status and reasons specifying the need for Financial Aid.
The final decision regarding the application shall be notified via mail within 15 days.
Note: As an alternative process, learners have to go to the same course page and select the “Enroll for Free” option and the “Financial Aid Available” option immediately thereafter. They must now follow a dialogue box and continue with their application as provided above.
How it helps
Cybersecurity is a booming field that pays well to any professional irrespective of his role in the industry. Organisations and enterprises whether small or big consistently work towards an effective cybersecurity regime to keep their systems and data secure. Acing roles in this field requires expertise in topics like endpoint security and patch management, both of which are fundamental to avoid cyberattacks against an organisation. Cybersecurity Compliance Framework & System Administration Certification benefits include scientific learning of such aspects.
Candidates will definitely acquire depth skills centred around encryption and cryptography to help them analyse their impact on the software within a company. Cybersecurity Compliance Framework & System Administration Certification Syllabus entails practical exposure to security frameworks and compliance to help learners ace their role as a Junior Cybersecurity Analyst. This professional course caters to multiple specialisations and professional certifications which makes it well-valued by prospective employers.
Post-completion, candidates can expect better opportunities, kickstart their career in this field or switch job roles without much effort. The best part about this online learning programme is that while the learning outcomes focus on beginners, all of them culminate into professional skills that provide a step up to individuals.
FAQs
Most features on Coursera's learning interface are equipped with screen readers so visually impaired learners can opt for the same while pursuing this course.
To do s- after logging in on your account, go to the Settings option next to your name. Look for the Name Verification section and select "Verify My Name". Fill in and submit your request.
No, it will only display the name, the logo of IBM, verification URL and identity verification declaration along with the instructor's signature.
They can only do so as long as they are eligible for a refund.
Yes, the course material will be accessible to free learners for the seven days of their trial.
No, a refund can only be initiated on a web browser.
Yes, Coursera provides the option of payment through NetBanking and PayTM.
If the candidate is a paid learner, his subscription will be active for 180 days during which he can pursue the course multiple times.
No, refunds can only be made before the free trial ends.
Yes, they retain access to video modules and transcripts even after the subscription expires.
Articles
Popular Articles
Latest Articles
Similar Courses
Threat Intelligence Lifecycle Fundamentals
IBM via Edx
Information Technology Fundamentals for Business P...
Polytechnic University of Valencia, Valencia via Edx
Introduction to the Threat Intelligence Lifecycle
IBM via Coursera
Introduction to Cybersecurity Essentials
IBM via Coursera
Check Point Jump Start Cloud Security
Check Point Software Technologies Limited via Coursera
Cybersecurity and Privacy in The Internet of Thing...
Curtin University, Perth via Edx
Cyber Security Certification
Board Infinity
Healthcare Data Security Privacy and Compliance
Johns Hopkins via Coursera
Digital Security Training Cyber Threats and Risk M...
Coventry University, Coventry via Futurelearn
Courses of your interest
An Introduction To Coding Theory
IIT Kanpur via Swayam
C++ Foundation
PW Skills
Data Science Foundations to Core Bootcamp
Springboard
User Experience Design And Research
UM–Ann Arbor via Futurelearn
Data Analysis with Excel for Complete Beginners
CloudSwyft Global Systems, Inc via Futurelearn
Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
Data Science Fundamentals on Microsoft Azure
CloudSwyft Global Systems, Inc via Futurelearn
Artificial Intelligence Projects
Great Learning
More Courses by IBM
R Programming Basics for Data Science
IBM via Edx
Introduction to Data Engineering
IBM via Coursera
Relational Database Administration
IBM via Coursera
Introduction to Web Development with HTML CSS Java...
IBM via Coursera
Introduction to Devops
IBM via Coursera
Data Scientist Career Guide and Interview Preparat...
IBM via Coursera
Data Analyst Career Guide and Interview Preparatio...
IBM via Coursera
Introduction to Software Programming and Databases
IBM via Coursera
Introduction to Networking and Storage
IBM via Coursera