ibm v4
7885  Reviews star_rate star_rate star_rate star_rate star_half

Cybersecurity Breach Response Case Studies

This IBM Web-Based Training (WBT) is Self-Paced and includes: - Instructional content available online for duration of course - Visuals without hands-on lab exercises In this course, you will explore...

Read More
$430 USD
Course Code 8H161G-WBT
Duration 2 days
Available Formats Self Paced

This IBM Web-Based Training (WBT) is Self-Paced and includes:
- Instructional content available online for duration of course
- Visuals without hands-on lab exercises

In this course, you will explore incident response methodologies and security models, and will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. You will do an in-depth review of several past and recent breaches to learn how they were detected and what was done, or could have been done, to reduce the threat risk to the organization. Finally, you will explore the costs of data breaches through research studies and well known breaches.At the end of this course, you will select and research a cybersecurity breach in the news today. You will apply your knowledge and skills from this course and previous cybersecurity courses to analyze the type of attack, attack timeline, vulnerable systems, and any missed opportunities. This project will be graded by the course instructor.This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the seventh and final course in a series to acquire the skills to work in the field as a Cybersecurity Analyst.

 

Skills Gained

What you can do upon completion of this course:

  • Discuss the actions recommended by the National Institute of Standards and Technology (NIST) for establishing an incident response capability
  • Describe critical considerations for assembling an incident response team
  • Identify the essential requirements of each phase of the incident response lifecycle
  • Configure automatic processing of inbound email using the IBM Resilient platform
  • Describe each phase of a cyberattack detailed in the IBM X-Force IRIS cyberattack framework
  • Identify tips for preventing cyberattacks
  • Describe data breaches, including their common characteristics
  • Summarize the timeline of the Target Corporation data breach
  • Identify vulnerabilities exploited in the Target Corporation data breach
  • Describe the cost of the Target Corporation data breach
  • List measures that could have prevented the Target Corporation data breach
  • Explain how watering hole attacks work
  • Explain how phishing scams work
  • Describe different types of phishing scams
  • Identify the common signs of a phishing email
  • Describe the impact of phishing on individuals and corporations
  • Identify common types of identity theft
  • Summarize the timeline of the Facebook and Google phishing breach
  • Identify vulnerabilities exploited in the Facebook and Google phishing breach
  • Describe the cost and impact of the Facebook and Google phishing breach
  • List measures that could have prevented the Facebook and Google phishing breach
  • Explain the objective of a Point-of-Sale (PoS) breach
  • Describe PoS systems, including their security standards
  • Explain how malware infects PoS devices
  • Identify the different types of PoS malware
  • Explain what happens to information stolen in a PoS breach
  • List best practices for preventing PoS breaches
  • Summarize the timeline of the Home Depot PoS breach
  • Identify vulnerabilities exploited in the Home Depot PoS breach
  • Describe the cost and impact of the Home Depot PoS breach
  • List cybersecurity measures implemented to combat attacks such as those used in the Target and Home Depot breaches
  • Define third-party breach
  • Describe the types of third-party breaches
  • List best practices for preventing third-party breaches
  • Describe the impact of third-party breaches on individuals and businesses
  • Summarize the timeline of the Quest Diagnostics third-party breach
  • Identify vulnerabilities exploited in the Quest Diagnostics third-party breach
  • Describe the impact of the Quest Diagnostics third-party breach
  • Identify third-party breach prevention techniques developed from an analysis of companies that successfully prevent such breaches
  • Explain what ransomware is
  • Distinguish different types of ransomware
  • Describe ways in which users become ransomware targets
  • Identify techniques for protecting against ransomware attacks
  • List common examples of ransomware
  • Identify techniques used to extract money from ransomware victims
  • Summarize the timeline of the Atlanta ransomware breach
  • Identify vulnerabilities exploited in the Atlanta ransomware breach
  • Describe the cost and impact of the Atlanta ransomware breach
  • List measures that could have prevented the Atlanta ransomware breach
  • Create a data breach case study by applying what you learned in this course and others in the Cybersecurity Security Analyst Professional Certificate program

Who Can Benefit

Anyone who wants to gain a basic understanding of Cybersecurity or as the seventh course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.

Prerequisites

None

Course Details

Course Outline

Unit 1:  Incident Management Response and Cyberattack Frameworks

Unit 2:  Phishing Scams

Unit 3:  Point of Sale Breach

Unit 4:  3rd Party Breach

Unit 5:  Ransomware

Unit 6:  Apply Your Skill - Data Breaches