AI Academy

Introduction to Cybersecurity Essentials

Instructor: IBM Skills Network Team Duration: 1 week at 10 hours a week
Objective 1 Recognize the importance of data security, maintaining data integrity, and confidentiality
Objective 2 Demonstrate the installation of software updates and patches
Objective 3 Identify preferred practices for authentication, encryption, and device security
Objective 4 Discuss types of security threats, breaches, malware, social engineering, and other attack vectors
Hardening
Cyber Attacks
Authentications
Malware Protection
Information Privacy
Authorization (Computing)
Data Security
Security Awareness
Multi-Factor Authentication
Security Controls
Identity and Access Management
Cybersecurity
Network Security
Encryption
Email Security
System Configuration
Computer Security Awareness Training

Cybersecurity Architecture

Instructor: Jeff Crume Duration: 1 week at 10 hours a week
Objective 1 Describe the five foundational principles of cybersecurity and the Confidentiality, Integrity, and Availability (CIA) triad
Objective 2 Summarize the different areas that a cybersecurity architect must adopt to develop a secure enterprise solution
Objective 3 Discuss the different security domains, including IAM, endpoint security, network security, application security, and data security
Objective 4 Demonstrate your proficiency in recommending methods to improve network security in a given scenario
Identity and Access Management
Data Governance
Threat Detection
Cyber Security Strategy
Security Controls
Cyber Attacks
Network Security
Authorization (Computing)
Security Information and Event Management (SIEM)
Infrastructure Security
Authentications
Firewall
Security Testing
Application Security
Cybersecurity
Secure Coding
Endpoint Security
Data Security
Virtual Private Networks (VPN)

Encryption and Cryptography Essentials

Instructor: Dr. Manish Kumar , IBM Skills Network Team Duration: 16 hours to complete 3 weeks at 5 hours a week
Objective 1 Job-ready encryption and cryptography skills for cybersecurity employers need in just 4 weeks.
Objective 2 How to classify cryptographic algorithms and key exchange protocols and identify their applications in securing data
Objective 3 How to identify and apply encryption techniques to secure communication and ensure data privacy.
Objective 4 How to use hashing algorithms and digital signatures in blockchain to secure transactions, validate identities, and ensure data integrity.
Public Key Infrastructure
Cybersecurity
Algorithms
Blockchain
Encryption
Cryptographic Protocols
Network Security
Cryptography
Data Encryption Standard
Authentications
Advanced Encryption Standard (AES)
Data Integrity
Data Security

Introduction to Cybersecurity Careers

Instructor: Rav Ahuja , Dee Dee Collette Duration: 7 hours to complete
Objective 1 Compare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level.
Objective 2 Map IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity.
Objective 3 Identify the required certifications such as Security+, A+, CISSP, and CEH   for different job roles and the contents of each certification.
Objective 4 Discover the right role for you in cybersecurity and learn how to prepare for your chosen career path.
Cybersecurity
Cyber Security Policies
Network Security
Technical Support and Services
Information Technology
Computer Security Awareness Training
Data Security
Cyber Security Strategy