Cyber Threat Intelligence
This badge earner can describe examples of network defensive tactics, discuss data loss prevention and endpoint protection concepts and tools, and explore the IBM Security Guardium user interface to learn how to classify data in a database environment. The earner can describe security vulnerability scanning technologies and tools and identify the key concepts around threat intelligence. They have explored the IBM Security QRadar SIEM product and suspicious alerts and know how to take action. Also this badge earner has learned and explored concepts around security tools and threat intelligence; penetration testing, incident response and forensics; and Cybersecurity breach case study research and reporting.
Specialization: Security Analyst Fundamentals (check status)
Course 1: Penetration Testing, Incident Response and Forensics (check status)
Course 2: Cyber Threat Intelligence (check status)
Course 3: Cybersecurity Capstone: Breach Response Case Studies (check status)
Google IT Support Certificate
Those who earn the Google IT Support Certificate have completed five-courses, developed by Google, that include hands-on, practice-based assessments and are designed to prepare them for entry-level roles in IT support. They are competent in foundational skills, including troubleshooting and customer service, networking, operating systems, system administration, and security.
Issuer: Google (Coursera)
Specialization: Google IT Support (check status)
Course 1: System Administration and IT Infrastructure Services (check status)
Course 2: The Bits and Bytes of Computer Networking (check status)
Course 3: Operating Systems and You: Becoming a Power User (check status)
Course 4: IT Security: Defense against the digital dark arts (check status)
Course 5: Technical Support Fundamentals (check status)
Introduction to Cybersecurity
The holder of this credential has introductory knowledge of cybersecurity, including the global implications of cyber threats, the impact of cyber attacks on industries, and why cybersecurity is a growing profession. The holder has an understanding of the ways in which networks are vulnerable to attack and Cisco’s approach to threat detection and defense. They also have insight into opportunities available for pursuing network security certifications.
Specialization: Introduction to Cybersecurity (check status)
Computer Security and Systems Management
The System Management and Security Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of major server operating systems in an enterprise environment and how to design and operate them securely.
Issuer: University of Colorado
Specialization: Computer Security and Systems Management (check status)
Course 1: Enterprise System Management and Security (check status)
Course 2: Windows Server Management and Security (check status)
Course 3: Linux Server Management and Security (check status)
Course 4: Planning, Auditing and Maintaining Enterprise Systems (check status)
Linux + Programare in Python pentru Incepatori (Linux + Python Programming for Beginners)
Course in Romanian Language (check status)