Use the discount code BF30 at checkout get 30%off a selection of courses in our IBM expert series.
What you get in the series deal
If you want to unlock your potential to keep your organisation secure, whilst gaining an IBM certified qualification, explore our Cyber Security Series. Get started with our foundation course. Or go for something more challenging with intermediate or advanced.
**Use the discount code BF30 at checkout get 30% off.**
Get exposed to the cyber threats landscape.
Engage in practical activities, utilising cloud-based enterprise threat intelligence solutions.
Get familiar with cyber-attack adversarial frameworks used by cybercriminal networks.
Analyse the motivations behind cyber-attacks and their impact on various industries.
Compare the methods by which cyber criminals gain access to critical assets.
Identify the unique security challenges brought by the widespread adoption of technologies.
Understand how an SOC responds to incoming cybersecurity threats.
Get acquainted with the benefits and risks of leveraging cloud technologies.
4. Cyber Attacks Anatomy - Get familiar with cyber-attack adversarial frameworks used by cyber-criminal networks by understanding the anatomy of cyber attacks.
Level 2 – Threat Intelligence
5. Threat Intelligence Approaches - Learn to install and use threat intelligence tools used by threat hunters such as IBM i2 Intelligence Notebook to enable organizations to thwart attacks from cybercrime organizations.
6. Hospital Threats and Scenario - Understand the difference between Threat Intelligence, Cyber Forensics and Threat Hunting.
7. Hospital Phishing Episode 1 - Understand healthcare cyber threats through a hospital cyber attack case study.
8. X-Force Exchange World Threat Map - Use IBM X-Force Exchange to monitor in real time events happening across different geographies and get alerts of incidents relevant to the enterprise security profile.
Level 3 – Threat Hunting
9. Security Operation Centers - Understand the benefits and structure of Security Operation Centres as an enterprise cyber security practice.
10. Threat Hunting - Evaluate approaches to proactively address cyber attacks by leveraging threat hunting techniques, methodology and tools used by Threat Hunters in their investigation.
11. Hospital Phishing Episode 2 - Understand healthcare cyber threats through a hospital cyber attack case study.
12. I2 Phishing Scenario -Acquire hands-on experience using a Threat Hunting tool – IBM i2 Analyst Notebook on a Hospital attack scenario.
1. Cyber Security Landscape - Analyse the motivations behind cyber-attacks and their impact on various industries and organizations.
2. Cyber Resilience - Evaluate the benefits of a cyber resilience framework in detecting and responding to cybersecurity threats.
3. Monitoring Global Incidents - Understand the current impact of cybersecurity threats across different geographies and explore the enterprise security domains.
Level 2 - Security Systems
4. Network Security - Looking at how no one is immune from cybersecurity threats but looking at quick response tactics to cyber threats rather than hypothetical attack situations.
5. Mobile and IoT Security - Identify the unique security challenges brought by the widespread adoption of mobile and the Internet of Things in the enterprise race for digital transformation.
6. Network Security Tools - This serves as the front line of defence or governments and organisations, supporting the global economy and communications infrastructure on which our society relies today.
7. Endpoint Security Practices - Understand the tools used by penetration testers and ethical hackers (network CLI tools, telnet, SSH, Nmap, Wireshark, and many others).
Level 3 – Threat Landscape
8. Application Security - Identify the unique security challenges brought by the widespread adoption of applications in the enterprise race for digital transformation.
9. Data Security - Identify the unique security challenges brought by the widespread adoption of data in the enterprise race for digital transformation.
10. Web banking Data Breach Scenario - Put yourself in the role of a penetration tester to footprint, gain access and then attack a system. This will help you to understand the role and responsibilities of a penetration tester, familiarise yourself with how attackers gain access to systems, and conceptualise the repercussions of a successful attack.
1. Cloud Security - Get acquainted with the benefits and risks of leveraging cloud technologies as the underpinning enterprise infrastructure.
2. Security Intelligence - Insight into threat modelling methods and frameworks such as MITRE, Diamond, IBM IRIS, IBM threat hunting, and security intelligence approaches to threat management.
3. Scan and Investigate Vulnerabilities - Employ high-end security enterprise solutions such as: IBM QRadar SIEM, Vulnerability manager, User behaviour analytics, IBM QRadar advisor with Watson, I2 analyst notebook, and IBM Cloud X-Force exchange to counter a variety of cybersecurity threats.
4. Using IBM QRadar - IBM® QRadar® Security Information and Event Management (SIEM) helps security teams accurately detect and prioritise threats across the enterprise, and it provides intelligent insights that enable teams to respond quickly to reduce the impact of incidents.
Level 2 – Security Operations Team
5. Threat Intelligence - Understand the value of adopting Security Intelligence methods by exploring the characteristics of Security Information and event Management (SIEM) tools, and their efficacy on thwarting a real-life Phishing attempt scenario.
6. Security Operations Center - Understand the processes by which a Security Operations Center (SOC) organization responds to incoming cybersecurity threats, including the setup of Blue and Red teams, and the orchestration of Security Intelligence, Threat Hunting and investigation techniques using sophisticated AI-powered technologies.
7. Investigating User Behaviour - Create a custom QRadar rule that contributes to the user behavioural risk and configure a predefines User Behaviour Analytics (UBA) applicator. Investigate user behaviour from the UBA dashboard and the offense tab in QRadar Console.
8. Analysing Threats with Intelligence - Analyse the roles and archetypes that work in concert to address cybersecurity incidents within a Security Operations Center.
Level 3 – Project Assignment: Real World Scenario
9. Security Breach Scenario - Understand what a Security Analyst is doing, thinking and feeling during a security breach.
10. Rule Triggers and Offense - A QRadar rule triggers an offence indicating malicious files on a single endpoint. Explore how a SOC responds to security breach scenarios.
11. As-is Scenario Mapping - Learn the roles and responsibilities in a Security Operations Centre (SOC)and experience how a SOC responds to a security breach scenario.
IBM is a leading cloud platform and cognitive solutions company. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 350,000 employees serving clients in 170 countries. With Watson, the AI platform for business, powered by data, we are building industry-based solutions to real-world problems. For more than seven decades, IBM Research has defined the future of information technology with more than 3,000 researchers in 12 labs located across six continents. For more information, visit ibm.com/this-is-ibm
Cloud Security & AI Integration Architect – STSM Developer
IBM Cloud and Cognitive Product Development
Krithika Prakash is a Senior Technical Staff Member (STSM) in APIConnect & DataPower Gateways product engineering team. She is the architect and lead engineer responsible for setting the technology direction for the development organisation. She holds patents in the areas of security and emerging digital technologies. Krithika is also an IBM recognised Speaker/Presenter and has been a seasoned speaker at IBM THINK and external conferences.
Program Manager, Secure Engineering and Incident Response
Ron has over 25 years of experience in development, then another 10 in cyber security. He has provided technical leadership in the formulation and execution of secure engineering policies, practices and implementations for the entire IBM software portfolio. He currently reviews products prior to secure release and leads the Security division’s vulnerability response team. He has over a dozen patents and presents at security conferences. He is one of the founders of IBM’s internal secure engineering education series, Think Like a Hacker! He is co-maintainer for the OWASP Side-KEK project, and Ron maintains technical skills in application security, Enterprise Java, Python, safe cracking, and holds General Class amateur radio license KO4RON.
William J. Rippon
Chief Information Security Officer
William J. Rippon has over 25 years of experience in the field of information technology with a focus on security, data networking and services, as well as real-time communications. Currently, he is actively engaged in leading efforts related to enterprise security, privacy and compliance. He is the author or co-author of multiple patents and technical papers.
Jeff Crume is a Distinguished Engineer and CTO for IBM Security Americas as well as an Assistant Professor at NC State University. He is an IBM Master Inventor with a PhD in Cybersecurity and is the author of a book entitled “Inside Internet Security: What Hackers Don’t Want You To Know” as well as a contributing author to the “Information Security Management Handbook.” Jeff is a member of the inaugural class of the NC State University Computer Science Alumni Hall of Fame and has served on the school’s Strategic Advisory Board. He currently serves on the editorial board for the “Information and Computer Security” research journal and is a member of the IBM Academy of Technology. He holds CISSP and ISSAP professional IT Security certifications as well as Distinguished Chief IT Architect credentials from The Open Group. Jeff lived in Beijing on assignment in 2006 and has worked with clients in more than 40 countries.
Once you enrol on the series, it's self-paced, so you can learn at your own speed and progress through the individual modules in a way that suits you. You will progress through them in order as the course is set up to constantly build your knowledge throughout.
After completing this course, you will receive an IBM Badge, awarded by the IBM Skills Academy. They are secure, web-enabled credentials that contain granular, verified information employers can use to evaluate an individual's potential. After completing the program, you'll receive your badge from UK Learns via email.
The courses are divided into practice levels. Each course covers more advanced topics and builds up on top of the concepts, practice and skills addressed on the previous levels. You will be your own guide on this course, using your current skillsets to navigate the learning modules on the course at your own pace.
After each module, you'll complete some knowledge check questions to ensure you have understood everything in the module.
- Foundation - This badge earner has completed all the learning activities included in this online learning experience, including hands-on experience, concepts, methods and tools related to the threat intelligence and hunting domain. The individual has demonstrated domain knowledge and understanding in adopting practices, methods and tools that relates to the activities performed in cyber threat hunting.
- Intermediate - This badge earner has completed all the learning activities included in this online learning experience, including hands-on experience, concepts, methods and tools related to the enterprise security domain. The individual has demonstrated skills and understanding in the approaches to elevate an organization’s overall security posture, by adopting practices, methods and tools that increase enterprise cyber resilience.
- Advanced - This badge earner has completed all the learning activities included in this online learning experience, including hands-on experience, concepts, methods and tools related to the Security Operations Center’s domain. The individual has developed skills around techniques, technologies, roles and scenarios needed to establish the foundations of a Security Operations Center (SOC) within an organisation.
Recommended for you
Thank you for your interest in
our IBM expert series!