Post

TOC for Cybersecurity and Networks

IBM Cybersecurity Analyst Professional Certificate1

IBM Cybersecurity Analyst Professional Certificate is a specialization course, which is led by industry experts. The specialization focuses on intermediary skills related to cybersecurity.

1) Introduction to Cybersecurity Tools and Cyberattacks2

  1. History of Cybersecurity
  2. A brief overview of types of actors and their motives
  3. An overview of key security concepts
  4. An overview of key security tools

2) Cybersecurity Roles, Processes and Operating System Security3

  1. People processes and technology
  2. Examples and principles of CIA triad
  3. Operating System Security Basics
  4. Overview of Virtualization

3) Cybersecurity Compliance Framework and System Administration4

  1. Compliance Frameworks and Industry Standards
  2. Client System Administration Endpoint Protection and Patching
  3. Server and User Administration
  4. Cryptography and Compliance Pitfalls

4) Network Security and Database Vulnerabilities5

  1. TCP IP Framework
  2. Basics of IP Addressing and the OSI Model
  3. Introduction to Databases
  4. Deep Dive Injection Vulnerability

5) Penetration Testing, Incident Response and Forensics6

  1. Penetration Testing
  2. Incident Response
  3. Digital Forensics
  4. Introduction to Scripting

6) Cyber Threat Intelligence7

  1. Threat Intelligence
  2. Data Loss Prevention and Mobile Endpoint Protection
  3. Scanning
  4. SIEM Platforms
  5. Threat Hunting

Cybersecurity Specialization8

Cybersecurity Specialization is an advanced course offered by University of Maryland. It dives deep into the core topics related to software security, cryptography, hardware etc.

My progress in this specialization came to a halt after completing the first course, primarily because the subsequent courses were highly advanced and required background knowledge that I lacked. I will resume my journey once I feel confident in possessing the necessary expertise to tackle those courses.

1) Usable Security9

  1. Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models
  2. Design: design methodology, prototyping, cybersecurity case study
  3. Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity case study
  4. Strategies for Secure Interaction Design: authority, guidelines for interface design
  5. Usable Authentication: authentication mechanisms, biometrics, two-factor authentication
  6. Usable Privacy: privacy settings, personal data sharing, data inference

References

This post is licensed under CC BY 4.0 by the author.