Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Cybersecurity Capstone and Case Studies

Course Cover
compare button icon

Course Features

icon

Duration

6 weeks

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Effort

4 hours per week

icon

Teaching Type

Self Paced

Course Description

Throughout this course, you will delve into incident response methodologies and security models through case studies, equipping yourself with effective strategies for handling security incidents. You will also learn to identify and categorize various types of vulnerabilities and associated attacks commonly faced by modern organizations.

You will explore several past and recent breaches in-depth and analyze how they were detected and evaluate potential mitigation strategies to reduce threat risks to organizations. Furthermore, this course will provide insights into the costs of data breaches through comprehensive research studies and renowned breach case studies.

As part of the course requirements, you will select a cybersecurity breach from current news and apply your knowledge and skills gained from this course and previous cybersecurity courses to conduct a detailed analysis. This project will be evaluated and graded by your peers in this course.

Enroll in this course today in order to establish the necessary foundation for developing cybersecurity expertise as part of the IBM Cybersecurity Analyst Professional Certificate program.

Course Overview

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

It is recommended that you complete the previous courses in the IBM Cybersecurity Analyst Professional Certificate before taking this course!

What You Will Learn

Analyze threats and breaches and determine their consequences to an organization

Discuss how to approximate the cost of a data breach

Explore phishing scams and their implications on organizations

Research a recent cyber-attack and recognize the data breaches and vulnerabilities for a specific company

Course Instructors

Author Image

Skills Network

Instructor

IBM at Skills Network
Course Cover