- Level Foundation
- Duration 16 hours
- Course by IBM
-
Offered by
About
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will explore in depth several past and recent breaches to learn how they were detected and what was done or could have been done to reduce the threat risk to the organization. Finally, you will explore the costs of data breaches through research studies and well known breaches. This course requires you to select and research a cybersecurity breach in the news today and apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by your peers in the course. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the seventh and final course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cybersecurity-breach-case-studies . In this course, you will learn to: Apply incident response methodologies. Research and describe a watering hole attack. Research and describe ransomware threats and the consequences to organization. Research and describe 3rd party breaches and how they affect an organization. Research and describe the effects of a phishing attack. Research and describe a point of sale attack and approximate cost of data breaches. Perform a case study on a current cyber attack and breach.Modules
Overview of Incident Management Response
1
Assignment
- Incident Management Knowledge Check
2
Videos
- NIST Incident Response Lifecycle - Teams
- NIST Incident Response Lifecycle
3
Readings
- Course Introduction
- Earn an IBM digital badge
- Apply Incident Response
Cyberattack Frameworks
1
Assignment
- Cyberattack Frameworks Knowledge Check
2
Videos
- IBM X-Force IRIS Cyberattack Framework
- What is a Breach?
2
Readings
- X-Force Command Center
- X-Force Threat Intelligence Index 2023
Real World Case Studies
1
Assignment
- Case Studies Knowledge Check
3
Videos
- Target Attack Timeline
- Target Attack Vulnerabilities
- Watering Hole Attack
Graded Assessment
1
Assignment
- Incident Management Response and Cyberattack Frameworks Graded Assessment
Introduction to Phishing Scams
1
Assignment
- Introduction to Phishing Scams Knowledge Check
3
Videos
- Phishing Scams Overview
- Phishing Email Study
- Impact of Phishing
2
Readings
- Exploring Steps to Recovery
- Can You Spot the Difference?
Case Study
1
Assignment
- Phishing Case Study Knowledge Check
1
Videos
- Phishing Case Study: Google & Facebook
Graded Assessment
1
Assignment
- Phishing Scams Graded Assessment
Introduction to Point of Sale Attacks
1
Assignment
- Introduction to Point of Sale Attacks Knowledge Check
2
Videos
- Point of Sale Breach Overview
- PoS Malware
2
Readings
- PoS Skimming
- The Cyber Kill Chain in PoS Breaches
Case Study
1
Assignment
- PoS Case Study: Home Depot Knowledge Check
1
Videos
- PoS Case Study - Home Depot
Graded Assessment
1
Assignment
- Point of Sale Breach Graded Assessment
3rd Party Breach Overview
1
Assignment
- Third-Party Breach Knowledge Check
2
Videos
- 3rd Party Breach Overview
- 3rd Party Breach Impacts
1
Readings
- List of 3rd Party Breaches
Case Study
1
Videos
- 3rd Party Breach - Quest Diagnostics
1
Readings
- Breach Plan
Graded Assessment
1
Assignment
- Third-Party Breach Graded Assessment
Ransomware Overview
1
Assignment
- Ransomware Knowledge Check
2
Videos
- Ransomware overview
- Examples of Ransomware
2
Readings
- Emerging Trends in Ransomware
- Ransomware of Things
Ransomware Case Study - City of Atlanta
1
Assignment
- Ransomware Case Study Knowledge Check
1
Videos
- Ransomware Case Study - City of Atlanta
Graded Assessment
1
Assignment
- Ransomware Graded Assessment
Applied Project - Data Breaches
1
Peer Review
- Applied Project - Investigate a Recent Data Breach
1
Videos
- Introduction to the Peer-to-Peer Applied Project - Data Breaches
2
Readings
- Continue your Training
- CC Certification Exam: Free for Limited Time
Auto Summary
Explore incident response and security models in the "Cybersecurity Capstone: Breach Response Case Studies" course by Coursera. Led by experts, this foundational IT & Computer Science course dives into real-world breaches, teaching you to recognize vulnerabilities and analyze attacks. Gain practical skills through a research project on current breaches, culminating in an IBM digital badge. Ideal for aspiring Cybersecurity Analysts, the course spans 960 minutes with starter subscription options.

IBM Skills Network Team