Basic Network and Database Security
About this Course
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in this course. Enroll to learn more, complete the course and claim your badge! This course gives you the background needed to understand basic types of network security. You will learn about computer networks including Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization and network security controls that guard an organization from cybersecurity attacks. In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch. You will learn about various security data types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. Ultimately you will learn how to safeguard an organizations sensitive information against data loss from cyberattacks. This course will give you a basic understanding of network security and sensitive data protection services or as part of the overall Cybersecurity basics professional certificate.Created by: IBM
Level: Introductory
Related Online Courses
Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so... more
This course is part of W3C's "Front-End Web Developer" Professional Certificate. Have you just begun your journey into Web development? This course introduces you to the basics of Web design and... more
This course will introduce the core data structures of the Python programming language. We will move past the basics of procedural programming and explore how we can use the Python built-in data... more
Deploying and managing applications securely and efficiently is critical in today's technology organizations. As a result, organizations are turning to Kubernetes to run their workloads, only to... more
Este curso forma parte de una serie de 5 cursos de introducción al uso de sistemas de información en las empresas que te introducirá en el apasionante mundo de las TIC. La serie de cursos está pen... more