AI Academy

Introduction to Cybersecurity Careers

Instructor: Rav Ahuja , Dee Dee Collette Duration: 7 hours to complete
Objective 1 Compare the roles and responsibilities of various careers within the cybersecurity field and how to progress from one level to the next level.
Objective 2 Map IT fundamental skills, technical skills, and soft skills to the different job roles at various levels in cybersecurity.
Objective 3 Identify the required certifications such as Security+, A+, CISSP, and CEH   for different job roles and the contents of each certification.
Objective 4 Discover the right role for you in cybersecurity and learn how to prepare for your chosen career path.
Cybersecurity
Cyber Security Policies
Network Security
Technical Support and Services
Information Technology
Computer Security Awareness Training
Data Security
Cyber Security Strategy

Introduction to Hardware and Operating Systems

Instructor: IBM Skills Network Team Duration: Approx. 15 hours
Objective 1 Demonstrate an understanding of operating system fundamentals.
Objective 2 Recognize desktop and laptop hardware components and devices.
Objective 3 Identify and describe internal desktop and laptop computer components, interfaces, and peripherals.
Objective 4 Explain basic workstation setup, locate operating system settings, and identify good troubleshooting practices.
Networking Hardware
System Configuration
Operating Systems
Hardware Troubleshooting
Technical Support
Microsoft Windows
Linux
Computer Hardware
Peripheral Devices
Disaster Recovery
Computer Architecture
User Accounts
Mac OS

Introduction to Software, Programming, and Databases

Instructor: IBM Skills Network Team Duration: 2 weeks at 10 hours a week
Objective 1 Classify, install, configure, and manage software including mobile platforms.
Objective 2 Discuss cloud computing and web browser concepts.
Objective 3 Explain software development models, techniques, and concepts.
Objective 4 Describe fundamental database management concepts.
Databases
Database Management
Application Development
Software Versioning
Computing Platforms
Cloud Computing
Web Applications
Programming Principles
Browser Compatibility
Computer Programming
Information Technology
Software Development Life Cycle
Software Installation
Data Maintenance

Introduction to Networking and Storage

Instructor: IBM Skills Network Team Duration: 1 week at 10 hours a week
Objective 1 Identify wired and wireless network types, explain physical and logical topology, differentiate network cable types and what each is used for.
Objective 2 List common network devices. Discover what packets are and how IP addresses work, and explain what protocols are and why models are necessary.
Objective 3 Determine how to set up and encrypt networks and mobile devices. Diagnose connectivity issues and utilize the command prompt and Windows Settings.
Objective 4 List network drive types, explain RAM, ROM, and RAID, and troubleshoot storage issues. Explain STaaS, and define file, block, and object storage.
Local Area Networks
Network Administration
Network Architecture
OSI Models
Data Storage
Cloud Storage
System Configuration
Microsoft Windows
Network Troubleshooting
General Networking
Network Protocols
TCP/IP
Computer Networking
Networking Hardware
Network Infrastructure
Command-Line Interface
Wireless Networks
Cloud Services

Introduction to Cloud Computing

Instructor: Rav Ahuja Duration: Approx. 12 hours
Objective 1 Define cloud computing and explain essential characteristics, history, the business case for cloud, and the emerging technologies enabled by cloud
Objective 2 Describe the cloud service models- IaaS, PaaS, SaaS, and cloud deployment models- Public, Private, Hybrid; explain cloud infrastructure components
Objective 3 Explain emerging Cloud related trends including HybridMulticloud, Microservices, Serverless, Cloud Native, DevOps, and Application Modernization
Objective 4 List and describe services of popular cloud platforms including AWS, Microsoft Azure, Google Cloud, IBM Cloud, Alibaba Cloud, and others
Infrastructure As A Service (IaaS)
Virtual Machines
Cloud Platforms
Cloud Storage
Serverless Computing
Cloud Services
Microservices
Emerging Technologies
DevOps
Cloud Security
Cloud-Native Computing
Hybrid Cloud Computing
Cloud Computing
Software As A Service
Cloud Computing Architecture

Introduction to Cybersecurity Essentials

Instructor: IBM Skills Network Team Duration: Approx. 12 hours
Objective 1 Recognize the importance of data security, maintaining data integrity, and confidentiality
Objective 2 Demonstrate the installation of software updates and patches
Objective 3 Identify preferred practices for authentication, encryption, and device security
Objective 4 Discuss types of security threats, breaches, malware, social engineering, and other attack vectors
Hardening
Cyber Attacks
Authentications
Malware Protection
Information Privacy
Authorization (Computing)
Data Security
Security Awareness
Multi-Factor Authentication
Security Controls
Identity and Access Management
Cybersecurity
Network Security
Encryption
Email Security
System Configuration
Computer Security Awareness Training

Security Principles

Instructor: ISC2 Education & Training Duration: 5 hours to complete
Risk Management Framework
Cyber Risk
Data Ethics
Security Awareness
Cyber Governance
Data Integrity
Security Controls
Cyber Security Policies
Cybersecurity
Information Assurance

Incident Response, BC, and DR Concepts

Instructor: ISC2 Education & Training Duration: Approx. 2 hours
Disaster Recovery
Incident Response
Crisis Management
Information Assurance
Business Continuity
Cybersecurity
Security Management

Access Control Concepts

Instructor: ISC2 Education & Training Duration: 4 hours to complete
Cyber Security Policies
Security Awareness
Identity and Access Management
Authentications
Security Controls
Role-Based Access Control (RBAC)
Data Access
Authorization (Computing)

Network Security

Instructor: ISC2 Education & Training Duration: Approx. 8 hours
Computer Networking
General Networking
Infrastructure Security
Network Protocols
Network Planning And Design
Encryption
Cyber Attacks
Threat Detection
Cybersecurity
Threat Management
Firewall
Cloud Computing
Network Security
TCP/IP
Data Centers

Security Operations

Instructor: ISC2 Education & Training Duration: Approx. 8 hours
Configuration Management
General Networking
Encryption
System Monitoring
Continuous Monitoring
Security Controls
Event Monitoring
Security Strategy
Network Security
Computer Security Awareness Training
Data Security
Data Management
Cyber Security Policies
Cybersecurity
Security Management

Cybersecurity Case Studies and Capstone Project

Instructor: IBM Skills Network Team , Dee Dee Collette Duration: 6 hours to complete
Objective 1 Hands-on experience in analyzing cybersecurity case studies to identify threat tactics and assess vulnerabilities you can talk about in interviews
Objective 2 Demonstrable, practical skills for applying response frameworks and forensic techniques to real-world breach scenarios
Objective 3 Expertise in penetration testing and compliance analysis to evaluate organizational security regarding compliance successes and failures
Objective 4 Hands-on experience with researching real-world data breach scenarios and analyzing them to propose recommendations
Artificial Intelligence
Security Awareness
Threat Detection
Vulnerability Management
Malware Protection
Vulnerability Assessments
Cyber Threat Intelligence
Threat Management
Penetration Testing
Incident Response
Computer Security Incident Management
Cybersecurity