- What is IT security?
- Introduction to Process
- Key ITIL Processes
- Overview of People, Process and Technologies
- Information Technology Infrastructure Library (ITIL) Overview
- Welcome to People, Process and Operating System Fundamentals for security.
- Frameworks and their purpose
- Business Process Management Overview
- Roles in Security
Cybersecurity Roles, Processes and Operating System Security
Coursera has introduced Cybersecurity Roles, Processes & Operating System Security to acknowledge the importance of ...Read more
Beginner
Online
4 Weeks
Quick Facts
particular | details | |||
---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
Cybersecurity Roles, Processes & Operating System Security programme is offered by IBM with a motive to make the people smarter as the world is getting digital. Through this programme, candidates would understand the key importance of cybersecurity in any organization. They will learn about the challenges faced by the organization in the Modern era and also how to overcome such challenges. The programme is appropriate for the candidates who aspire to work in the field of Cybersecurity as a Jr Cybersecurity Analyst.
The course is inclusive of multiple programmes or specializations. Apart from cybersecurity, Coursera has introduced the concept of virtualization and it’s relevancy for cybersecurity. In 4 weeks, the candidates will have an understanding of Operating System Security and Cybersecurity roles & processes. They will also learn about the working of cybersecurity in different operating systems like Mac/OS, Mobile, Windows, and Linux.
The highlights
- Shareable Certificate
- Subtitles available
- Beginner's level
- Flexible deadlines
- Flexible schedule
- Financial aid provided
- Offered by IBM
Program offerings
- 100% online
- Practice exercise
- Reading
- Graded assignments
- Pre-recorded modules
Course and certificate fees
Cybersecurity Roles, Processes and Operating System Security Fees details:
Particulars | Amount |
Course Fee, 1 Month | Rs. 4,085 |
Course Fee, 3 Month | Rs. 8,171 |
Course Fee, 6 Month | Rs. 12,256 |
certificate availability
Yes
certificate providing authority
Coursera
Who it is for
Cybersecurity Roles, Processes & Operating System Security by Coursera offers training to the following individuals -
- Security Engineer
- Security Software Developer
- Security Architects
- IT Security Analysts
- Security Administrator
- Analysts
- Security manager
Eligibility criteria
Certification Qualifying Details
A candidate will get a course completion certificate if he/she has selected the “Audit mode”. However, the candidate must score well in the assignments, quizzes, and project exercises to get the certificate.
What you will learn
- After completing the course, the participants will have hands-on experience in different operating systems like Mac/OS, Mobile, Windows, and Linux. The comprehensive study material would teach how to give basic commands on different operating systems.
- Once the course is completed, the candidate would earn a digital badge from IBM. The tag of IBM would help the candidates in getting better job opportunities.
The syllabus
Week 1: People Process & Technology
Videos
Practice Exercise
- Frameworks, Policies and Roles
- People, Process and Technology
- Welcome to People, Process and Operating System Fundamentals for Cybersecurity
- Business Process Management and IT Infrastructure Library Basics
Readings
- IBM Global Subject Matter Experts
What is IT Service Management? - ITIL framework
- Earn an IBM digital badge
Week 2: Examples & Principles of the CIA Triad
Videos
Practice Exercise
- Principles of the CIA Triad
- Further discussion of confidentiality, integrity and availability
Readings
ISF Threat Horizon 2023: Security at a Tipping Point
Week 2: Authentication and Access Control
Videos
- Access Control Methods
- Introduction to Authentication and Access Control
- Open Web Application Security Project (OWASP)
- Access Control - Physical and Logical
- Identification and AAA
Practice Exercise
- Access Control
- What is AAA?
- Authentication and Access Control
Readings
OWASP Top 10 Project
Week 3: Windows Operating System Security Basics
Videos
- File Systems
- Shortcuts and Commands
- Welcome to operating systems fundamental
- Additional Shortcuts
- User and Kernel Mode
- Directory Structure
Practice Exercise
- Shortcuts and Commands
- User and Kernel Modes
- Windows Operating System Security Basics
- File Systems and Directory Structure
Week 3: Linux Operating System Security Basics
Videos
- File Systems
- Permission and Owners
- Key Components
- Basic Commands
Readings
- Hands-On Lab: Hardening Kali Linux Part 1
- Hands-On Lab: Hardening Kali Linux Part 2
- Pentesrmonkey research
Practice Exercise
- Linux Operating System security basics
- File systems
- Key Components
- Linux Basic Commands
Week 3: MacOS Security Basics
Videos
- macOS Recovery
- macOS Auditing
- macOS Security Settings
Reading
- macOS Developer resources
Practice exercise
- macOS Resources Knowledge Check
Week 4: Overview of Virtualization
Videos
- What is Cloud Computing?
- Virtualization module introduction
- Wrap up
- Virtualization to Cloud
- Cloud Benefits, Security and Governance
- An Overview of Virtualization
Practice Exercise
- Virtualizations Basics
- Virtualization Basics and Cloud Computing
Readings
- SANS Institute research exercise
Admission details
The following steps need to be followed by the students for Cybersecurity Roles, Processes & Operating System Security:
Step 1: Go to the official page of the course.
Step 2: Click on “Enroll for Free” and choose the programme Cybersecurity Roles, Processes & Operating System Security.
Step 3: Select the option of a 7-days free trial.
Step 4: After 7-days of the trial, the candidate needs to pay the required fees.
Step 5: Once the transaction is completed, you will receive a confirmation of your enrollment.
Scholarship Details
The scholarship is not granted for the Cybersecurity Roles, Processes & Operating System Security but the financial support is provided by Coursera. The candidates can look for support by selecting the link for the Financial Aid which can be found on the left side of the screen below the “Enroll for Free” option. Further, candidates will have to fill in the application and once it is approved, they will receive a notification from Coursera.
How it helps
Together with IBM, Coursera has taken an initiative to create the Cybersecurity Roles, Processes & Operating System Security programme that focuses on the cybersecurity of the operating systems. This course will spread awareness about cyber threats and hackings among users. The demand for security analysts and security consultants has increased due to illegal practices in the cyber world. The hands-on projects will help in analyzing the challenges faced in cybersecurity and the solutions to overcome such challenges.
The participants will learn the basic command practices which vary according to the operations of multiple operating systems. They would understand the concept of cloud computing and virtualization. The course would help the participants in studying the framework of different operating systems like Mac/OS, Mobile, Windows, and Linux. The participants would become vigilant about cyber threats and how to secure the organization and the system from illegal practices.
FAQs
How to claim for the badges?
Credly Acclaim will send an email notification to the participants with the instructions to claim the badge. After accepting the badge, it will become necessary for the participant to create a user account on Acclaim.
Why is it necessary to create an account on Acclaim?
Through an account on Acclaim, the candidates can manage the badges, choose for other communications and features, and can also have the advantage of sharing the badges to social media platforms.
How to have access to assignments and lectures?
Access would depend upon the type of enrollment of the candidate. By choosing the option “course in the audit”, a candidate can access the study material for free. The candidate needs to purchase the Certificate experience, to access graded assignments, and earn a Certificate.
What happens after purchasing the certificate?
After the candidate purchases the certificate, they get access to the study materials and graded assignments. When the course is completed, the candidate receives an e-certificate attached to his/her accomplishment page. They can add it to their LinkedIn profile.
Articles
Popular Articles
Latest Articles
Similar Courses

Jump Start Network Security
Check Point Software Technologies Limited via Edx

CompTIA Exam Prep
LearnQuest via Coursera

CompTIA Practice
LearnQuest via Coursera

International Security Management
Erasmus University, Rotterdam via Coursera


Enterprise System Management and Security
CU Boulder via Coursera


Windows Server Management and Security
CU Boulder via Coursera


Proactive Computer Security
CU Boulder via Coursera


Basic Network and Database Security
IBM via Edx
Courses of your Interest
C++ Foundation
PW Skills
Advanced CFD Meshing using ANSA
Skill Lync
Data Science Foundations to Core Bootcamp
Springboard

User Experience Design And Research
UM–Ann Arbor via Futurelearn

Fundamentals of Agile Project Management
UCI Irvine via Futurelearn

Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
More Courses by IBM
R Programming Basics for Data Science
IBM via Edx
Threat Intelligence Lifecycle Fundamentals
IBM via Edx
Introduction to Data Engineering
IBM via Coursera
Introduction to the Threat Intelligence Lifecycle
IBM via Coursera
Introduction to Web Development with HTML CSS Java...
IBM via Coursera
Introduction to Devops
IBM via Coursera
Data Scientist Career Guide and Interview Preparat...
IBM via Coursera
Data Analyst Career Guide and Interview Preparatio...
IBM via Coursera
Introduction to Software Programming and Databases
IBM via Coursera