Cybersecurity Tools and Cyberattacks Fundamentals
Identify threats, implement security measures, and protect data. Jumpstart your cybersecurity career with this introductory course.

Language
- English
Topic
- Computer Science & Information Technology
Skills You Will Learn
- Critical Thinking, Cyber Security, Cyber Threat Intelligence, Forecasting, Cyber Attacks
Offered By
- IBMSkillsNetwork
Estimated Effort
- 24 hours
Platform
- SkillsNetwork
Last Update
- April 2, 2025
Dive into the evolution of cybersecurity, explore the motivations behind cyberattacks, and learn about various types of threats such as malware and ransomware. The course will also help you apply critical thinking to common cybersecurity practices and architectural frameworks.
Learning Outcomes
- Start your career in cybersecurity with this course, covering essential foundational concepts.
- Learn how to apply key cybersecurity principles, tools, and strategies to safeguard both digital and physical assets.
- Identify common security threats and best practices to protect against them.
- Understand authentication and identity management techniques to secure your organization.
Course Syllabus
- Video: Course Introduction
- General Information
- Learning Objectives and Syllabus
- Grading Scheme
- Helpful Tips for Course Completion
- Learning Objectives and Module Introduction
- Video: The Impact of the WarGames Movie on Cybersecurity
- Video: The Impact of 9/11 on Cybersecurity
- Video: The Impact of Covid 19 on Cybersecurity
- Reading: The History of Cybersecurity
- Practice Quiz
- Video: Critical thinking in Cybersecurity
- Video: Critical Thinking: A Model
- Video: Critical Thinking: 5 key Skills
- Activity: Would You Rather?
- Practice Quiz
- Module 1 Summary: Cybersecurity Insights
- Graded Quiz: Cybersecurity Insights
- Module 1 Glossary: Cybersecurity Insights
- Module Introduction and Learning Objectives
- Video: Types of Actors and Their Motives
- Reading: Insider Attacks
- Video: Cybersecurity Trends
- Activity: Exploring IBM's X-Force Threat Intelligence Index
- Practice Quiz
- Video: What is Malware? Let's Hear the Hacker's Viewpoint
- Video: What is Ransomware?
- Reading: Malware Types
- Video: How to Prevent Malware Attacks
- Reading: Malware Detection with Rootkit Hunters
- Hands-on Lab: Malware Scan using Rkhunter
- Practice Quiz
- Video: Social Engineering - How Bad Guys Hack Users
- Reading: Types of social engineering
- Video: What is Phishing?
- Video: Humans vs. AI Who's Better at Phishing?
- Reading: How to Prevent Social Engineering
- Practice Quiz
- Module 2 Summary: Cybersecurity Threats
- Module 2 Graded Quiz: Cybersecurity Threats
- Module 2 Glossary: Cybersecurity Threats
- Module Introduction and Learning Objectives
- Video: Internet Security Threats: Mapping
- Video: Internet Security Threats: Packet Sniffing
- Video: Internet Security Threats: IP Spoofing
- Video: Internet Security Threats: Denial-of-Service Attacks
- Video: Internet Security Threats: Injection Attacks
- Practice Quiz
- Video: Security Controls
- Reading: Types of Controls
- Video: System Security
- Video: Network Security
- Video: Application Security by Design
- Video: Vulnerability Management
- Video: Incident Response and Digital Forensics
- Practice Quiz
- Module 3 Summary: Cybersecurity Controls
- Module 3 Graded Quiz: Cybersecurity Controls
- Module 3 Glossary: Cybersecurity Controls
- Module Introduction and Learning Objectives
- Video: Identity and Access Management (IAM)
- Video: Authentication
- Video: Authorization
- Video: Access Controls
- Video: What is Multi-Factor Authentication?
- Activity: Enable Two-Factor Authentication
- Video: What is Single Sign On (SSO)?
- Video: Passkeys FIDO
- Practice Quiz
- Video: Physical Threats and Controls
- Reading: Physical Cybersecurity Controls
- Practice Quiz
- Module 4 Summary: Identity and Physical Controls
- Module 4 Graded Quiz: Identity and Physical Controls
- Module 4 Glossary: Identity and Physical Controls
- Module Introduction and Learning Objectives
- Reading: Final Project Overview
- Final Project: Secure Access
- Video: Course Wrap-up
- Congratulations and Next Steps
- Thanks from the Course Team
- Copyrights and Trademarks
- Claim your Badge Here
- Course Rating and Feedback
General Information
- This course is self-paced.
- This platform works best with current versions of Chrome, Edge, Firefox, Internet Explorer, or Safari.

Language
- English
Topic
- Computer Science & Information Technology
Skills You Will Learn
- Critical Thinking, Cyber Security, Cyber Threat Intelligence, Forecasting, Cyber Attacks
Offered By
- IBMSkillsNetwork
Estimated Effort
- 24 hours
Platform
- SkillsNetwork
Last Update
- April 2, 2025
Instructors
IBM Skills Network
IBM Skills Network Team
At IBM Skills Network, we know how crucial it is for businesses, professionals, and students to build hands-on, job-ready skills quickly to stay competitive. Our courses are designed by experts who work at the forefront of technological innovation. With years of experience in fields like AI, software development, cybersecurity, data science, business management, and more, our instructors bring real-world insights and practical, hands-on learning to every module. Whether you're upskilling yourself or your team, we will equip you with the practical experience and future focused technical and business knowledge you need to succeed in today’s ever-evolving world.
Read more