ED
Jan 1, 2021
This is a great course by all standards. This course is supposed to be practical in nature especially the System Administration part so that students can practice all the permissions that were taught.
MG
Apr 24, 2020
Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!
By Md. A R
•Aug 23, 2020
OK
By Bunyodbek G
•Apr 25, 2024
m
By Brian C
•Feb 26, 2021
Alex Campos was a terrible presenter; Jude Lancaster was good; but Dmitriy Beryoza was absolutely amazing: he's organized, speaks at the perfect speed (uninflected), explains thoroughly and clearly, and has no grammatical/pronunciation issues (which greatly diminished Alex's presentations). The course material had a bit of repetition, but was generally very well done.
Dmitriy was unique, in that he let you know when he was deviating off into esoteric minutiae that was not central to the topic. Can you get him to do ALL the courses from IBM?!?
By Henry N
•Oct 23, 2022
Though not meant to be extremely comprehensive, the course gives quite considerable information to aid future deeper understanding of cybersecurity concepts and subjects. Some of the discussed concepts could have been explained a little more with consideration that some course participants are new to cybersecurity. A sort of "How of Hashing" would have provided better background understanding for newbies to the Hashing Considerations topic.
By Iftekhar M T
•Aug 8, 2020
It was really informative. The instructors are professional at what they teach and overall I'm satisfied with the course. The main area of improvement: while some of the speakers were not native, some of them were, but in the end, most if not all of them were quite difficult to catch up with every so often because of their unclear articulation. Also, the images used and sound quality in the lectures were not up to par.
By Shaban S
•May 7, 2022
The course is nice and well organized but it will be better if you iclude practical demosntration in some areas like System Administration. I also suggest that, if it is possible to host some software like Wins Server, Redhat etc on IBM Power cloud environment and give us students even a minimum usage so that we can exparience the real side of this software.
But all in all I like this course.
By Jairo S
•Jun 16, 2021
I would like you to have more questions for the third week, as the content was quite long, it could be better explored. About the fourth week, I think the content was great, there could be more questions. An important issue, the questions could be random on each trial. Thanks for all!
Jairo Santos
By sidharth k
•Nov 16, 2020
Its mostly theory based although there is a little bit of practical applications.Courses like these should provide more hands on practical methods of teaching.The instructor seems to know/have a very vast and wide knowledge on the subject.I was impressed with the teahing.
By Ruggero R
•Sep 13, 2020
Not five stars because on video Key takeaways crypto & encry the presentation is repeated and only the audio not slide or graphical images or images ...only dark on background ... it's ok or there is some problem? i retry more times with the same result.
By Abhishek S
•Jun 27, 2020
Course is great only Presentation is not good. This courses uses slides with audio which is not intaractive. also you should add some virtual labs to the course like the courses offered by google.
By Chinmay A K
•Nov 15, 2020
nice courses to understand the frame work the linux commands and some important feature related to CIA and the main and important part the play to safeguard the information of customer/client.
By A.M I H A
•Nov 26, 2020
This is a one of the great course that i followed on the coursera learning platform. Also, this course gave me to learn the best practices that can used to protect computing related systems.
By Dirk P
•Aug 19, 2022
Excellent course for beginners. Just a minor glitch where one of the instructors in one of the cryptography modules refers to the well-known cryptographer Bill Schneier (instead of Bruce).
By Yu-shing C
•Apr 22, 2022
Some lecture videos are cut before it's completed. Some slide images are not very clear. Other than these issues, this course provides a good perspective to Cybersecurity overall.
By Psalm F
•Jun 11, 2021
Some errors on some of the quizzes, not so much the practice quizzes. Unfortunately, had to wait 8 hours to take a quiz again. Quizzes need to be corrected.
By Enric G A
•Aug 20, 2023
Nice course with good lessons.
To who i need to ask about the badge i cannot see ?
i´ve received certificate but not the digital badge.
Thank you.
By J. M A
•Jan 7, 2023
The transcript contains errors. The audio narration is often unclear and the written transcript has not been edited to reflect the narration.
By SHEILA S
•Jun 9, 2020
A good course for those who are starting their career in cybersecurity and to fill-in the gaps for those who are already in cybersecurity.
By Vasileios G
•Feb 21, 2022
A little bit repetitive on the file systems both on Windows and Linux OS but very intuitive regarding a begginers glance at cryptography
By Mohammad D
•Mar 19, 2021
Course is good for basic into about framework and System Admin. I am giving 4 star because some of the lectures has bad sound quality.
By Kirk O
•Nov 19, 2020
Very good course, especially for beginners. The content was delivered in a precise and systematical manner for a newbie to understand.
By Rakesh D
•Dec 10, 2021
Cryptography concepts and the different types of encryption discussed in detail. Very informative and a lot of supportive resources.
By william h
•Jun 22, 2022
this course was a little better, some of the questions are little wierd for people who know the subjects.. and well are kind of off
By Nihal S S
•Jul 31, 2020
Various skills and information about powerful mechanism i.e.Cryptography was provided and taught which is used for data security
By Kulvinder S S
•Mar 17, 2023
Its a great course to learn system admin.
but there must be included some examples of commands or a console to run commands.