This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field.
Offered By


About this Course
Learner Career Outcomes
11%
What you will learn
Discuss the evolution of security based on historical events.
List various types of malicious software.
Describe key cybersecurity concepts including the CIA Triad, access management, incident response and common cybersecurity best practices.
Identify key cybersecurity tools which include the following: firewall, anti-virus, cryptography, penetration testing and digital forensics.
Skills you will gain
- Information Security (INFOSEC)
- IBM New Collar
- Malware
- Cybersecurity
- Cyber Attacks
Learner Career Outcomes
11%
Offered by

IBM
IBM is the global leader in business transformation through an open hybrid cloud platform and AI, serving clients in more than 170 countries around the world. Today 47 of the Fortune 50 Companies rely on the IBM Cloud to run their business, and IBM Watson enterprise AI is hard at work in more than 30,000 engagements. IBM is also one of the world’s most vital corporate research organizations, with 28 consecutive years of patent leadership. Above all, guided by principles for trust and transparency and support for a more inclusive society, IBM is committed to being a responsible technology innovator and a force for good in the world.
Syllabus - What you will learn from this course
History of Cybersecurity
This module will give you a brief overview of the history of cybersecurity. You will also learn key terms and roles in cybersecurity.
A brief overview of types of actors and their motives
This module will provide you with a brief overview of types of actors and their motives. You will also understand different types of attacks and their impact on an organization and individuals. You will also learn about tools that are available to you to assist in any cybersecurity investigation.
An overview of key security concepts
This module will describe various key security concepts that are important in any cybersecurity position. The CIA Triad will be further explained. You will also begin to learn the significance of incident response and frameworks around cybersecurity. Finally, you will get an overview of IT Governance best practices and compliance.
An overview of key security tools
In this module, you will be introduced to key security tools including firewalls, anti-virus and cryptography. You will explore penetration testing and digital forensics. You will learn where you can get resources on industry and current threats to assist in further research around cybersecurity.
Reviews
- 5 stars68.29%
- 4 stars22.80%
- 3 stars5.60%
- 2 stars1.65%
- 1 star1.64%
TOP REVIEWS FROM INTRODUCTION TO CYBERSECURITY TOOLS & CYBER ATTACKS
Great Course Content and Explanation. Some Audio problems cost it *. Audio could have been better for most of the course parts. Thank You IBM for offering this course. Thank you all the instructors.
I've learned a lot! Plenty of information to retain. I love the challenge, I look forward to furthering my education in Cyber Security to not only better myself, but the cyber world! Thank you!
Learned to combine knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.
An introduction for a beginner that takes you through the steps, very informative, and helpful to guide you through the basics and move on towards advance level. I definitely recomend, Thank you IBM.
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Certificate?
How can you claim your badge?
More questions? Visit the Learner Help Center.