Introduction to Cybersecurity Tools & Cyber Attacks | Coursera |
A recent report from IBM indicates a sharp 71% increase in cyberattacks, underscoring a growing demand for cybersecurity professionals. This course by IBM aims to provide an introduction to essential cybersecurity concepts, threats, and preventative measures, serving as a foundational step into the field of cybersecurity. Participants in this course will delve into the historical development of cybersecurity and explore a structured approach to critical thinking. The curriculum covers various topics including threat actors, malware, ransomware, and defenses against social engineering tactics.
Furthermore, the course delves into internet security threats and the implementation of security controls. Participants will learn about fundamental aspects of identity and access management (IAM), authentication methods, and access control mechanisms. The course also addresses physical security threats that organizations face, along with effective strategies for mitigating them. Throughout the program, hands-on labs will enable learners to apply theoretical knowledge practically, while insights from industry experts will provide valuable technical expertise. The culmination of the course involves a final project designed to showcase comprehension of cybersecurity principles.
This course is suitable for individuals seeking a foundational understanding of cybersecurity and is part of a series aimed at preparing participants for a career as a Cybersecurity Analyst.
Notice!
Always refer to the module on your for the most accurate and up-to-date information.
History of Cybersecurity
- Risk
- Vulnerability
- Threat
- Exploit
- Security program
- Technical controls
- Asset management
- Administrative controls
- Confidentiality
- Integrity
- Availability
- All of the above
- $100M
- $1B
- $10B
- $100B
- The availability of communication that needs to be shared between the 3 friends.
- The complexity of communication between people who use different protocols.
- The positioning of firewalls that assure the integrity of communication between the 3 friends.
- The security of communication between Alice and Bob that risks interception by Trudy.
- Exposure and Sensitivity
- Identify Indicators and Exposure
- Sensitivity and Adaptive Capacity
- Potential Impacts and Adaptive Capacity
- Threat
- Exploit
- Vulnerability
- Risk
- Confidentiality
- Integrity
- Availability
- All of the above.
- Every 1 minute
- Every 1 Second
- Every 10 minutes
- Every 10 seconds
- The movie gave an accurate portrayal of the Iran-Contra scandal that could have only come from inside sources.
- A teenager hacked into a Pentagon computer that was capable of launching nuclear weapons.
- US Army generals did not know how to use the advanced weapons systems they were responsible for.
- KGB agents from the USSR were able to hack into Pentagon computer systems and steal plans for advanced US weapons.
- Every 1 minute
- Every 1 Second
- Every 10 minutes
- Every 10 seconds
- They are fictional characters used to illustrate how cryptography works.
- They were members of British Naval Intelligence who did pioneering work in secure communications that later became known as cryptography.
- They are the founders of modern cryptography.
- They are the pseudonyms (false names) used by members of the hacktivist group Anonymous.
- Every 1 minute
- Every 1 Second
- Every 10 minutes
- Every 10 seconds
- The failed Bay of Pigs invasion.
- Confirmed reports of Al Qaeda operatives hacking the E-mail servers of US Government agencies.
- The attack against the USS Cole while it was in port in Yemen.
- 9/11
A Brief Overview of Types of Actors and Their Motives
- Fancy Bears
- Anonymous
- Syrian Electronic Army
- Guardians of the Peace
- All of the above
- Enhanced espionage from more countries
- Far more advanced malware
- New consumer technology to exploit
- All of the above
- SWIFT is the protocol used by all banks to transfer money
- SWIFT is the flight plan and routing system used by all cooperating nations for international commercial flights
- SWIFT is the protocol used to transmit all diplomatic telegrams between governments around the world
- SWIFT is the protocol used by all US healthcare providers to encrypt medical records
- Assurance that the communicating entity is the one claimed
- Prevention of unauthorized use of a resource
- Assurance that a resource can be accessed and used
- Protection against denial by one of the parties in communication
- Active security mechanism
- External security mechanism
- Passive security mechanism
- Contingent security mechanism
- An attack
- An active threat
- An open case
- A malicious threat
- Denial of Service (DOS)
- Advanced Persistent Threat
- Water Hole
- Spectra
- Security Analysts
- Internal
- Hackers
- Hacktivist
- Canada
- Egypt
- Israel
- South Africa
- The Ponemon Institute
- Fancy Bears
- Syrian Electronic Army
- Anonymous
- Guardians of the Peace
- Government
- Internal
- Hacktivists
- Hackers
- False
- True
- True
- False
- False
- True
- Virus
- Worm
- Spyware
- Trojan Horse
- Adware
- Ransomware
- Distribution of Spam
- DDoS attacks
- Phishing attacks
- Distribution of Spyware
- As a Malware launchpadAll of the above
- Technical controls
- Administrative controls
- Passive controls
- Active controls
- Packet Sniffing
- Host Insertion
- Trojan Horse
- Ransomware
- All of the above
- A Denial of Service (DOS) attack
- A Trojan Horse
- A Masquerade attack
- A Ransomware attack
- A Social Engineering attack
- A Trojan Horse
- A Denial of Service attack
- A Worm attack
- Hacktivists
- Governments
- Hackers
- Internal
- Black Hats
- Business Policy
- Security Policy
- Specific security mechanisms
- Pervasive security mechanisms
- An active attack
- A passive attack
- An origin attack
- A masquerade attack
- False
- True
Quiz: Key Concepts
- Feedback based on the findings.
- Define the audit scope and limitations.
- Help to translate the business needs into technical or operational needs.
- Deliver a report.
- Automated Systems
- Post-Incident
- E-Discovery
- BCP & Disaster Recovery
- Procedures
- Tactical Plans
- Policies
- Audits
- Confidentiality
- Integrity
- Availability
- Confidentiality
- Integrity
- Availability
- Confidentiality
- Integrity
- Availability
- Alice sends a message to Bob with certainty that it will be delivered.
- Alice sends a message to Bob and Alice is certain that it was not read by Trudy.
- Alice sends a message to Bob with certainty that it was not altered while in route by Trudy.
- Alice sends a message to Bob and Bob knows for a certainty that it came from Alice and no one else.
- Incident
- Attack
- Event
- Threat
- Post-Incident Activities
- E-Discovery
- BCP & Disaster Recovery
- Automated system
- Prepare
- Follow Up
- Respond
- Policy
- Tactical Plan
- Strategic Plan
- Procedure
- SOX
- HIPPA
- PCI/DSS
- OCTAVE
- Conduct a Ransomware attack
- Advanced network management tasks
- Construct a botnet
- Conduct a pentest
Key Security Tools
- Uses malware definitions.
- Filter traffic between networks.
- Secures communication that may be understood by the intended recipient only.
- Scans the system and search for matches against the malware definitions.
- 1
- 2
- 4
- no keys are required
- Source and destination IP addresses.
- TCP/UDP source and destination port numbers.
- ICMP message type.
- TCP SYN and ACK bits.
- All of the above.
- An XML Gateway.
- An application-level firewall.
- A packet-filtering firewall.
- All of the above.
- They have state tables that allow them to compare current packets with previous packets.
- They are less secure in general than Stateless firewalls.
- They are faster than Stateless firewalls.
- All of the above.
- True
- False
- Social Engineering
- Known Ciphertext
- Rainbow tables
- Brute force
- Known Plaintext