Back to Catalog

Cybersecurity Fundamentals

Premium
BeginnerCourse

This beginner-level cybersecurity course is perfect for individuals aiming to start a career in IT support, network security, or cybersecurity-related roles.

Language

  • English

Topic

  • Computer Science & Information Technology

Industries

  • Information Technology

Skills You Will Learn

  • CyberSecurity, Cryptography, Cyberattacks, Information Security, Application Security, Data Security

Offered By

  • IBMSkillsNetwork

Estimated Effort

  • 12 hours

Platform

  • SkillsNetwork

Last Update

  • September 8, 2025
About this Course
Cybersecurity poses ongoing challenges for all organizations with IT infrastructures and data that need safekeeping. Take this course if you want to build key skills to address common security threats and find out about best practices to guard against issues related to cybersecurity. Take this course as a first step towards a career as a cyber analyst or entry-level security engineer. You will also find this course useful if you want to become conversant with IT personnel in the field.  
Diving into the world of cybersecurity, you’ll gain critical skills employers need, including identifying security threats, encryption, safe browsing, and implementing electronic communications security best practices. Explore various types of cybersecurity risks related to browsing, authentication and authorization, malware, viruses, and privacy.  
 
This course is ideal for technical support roles, often on the front lines of defense for cybersecurity issues, or managers and executives interacting with IT security personnel.

Prerequisites  
 
A basic understanding of Basic computer operating skills, including using a web browser is recommended.   

Related Specialization  
 
This course is part of IBM Technical (IT) Support Professional Certificate We recommend you enroll for the full specialization and work through the courses in order. Within a short time, you’ll have job-ready skills and practical experience on your resume that will boost your career!  

Course Syllabus

Welcome 
  • Video: Course Introduction
  • Reading: Course Overview
  • Reading: Learning Objectives and Syllabus
  • General Information
  • Reading: Helpful Tips for Course Completion
  • Reading: Grading Scheme
Module 1: Common Security Threats and Risks
  • Video: Confidentiality, Integrity, and Availability 
  • Video: Security and Information Privacy
  • Activity: Exploring Information Privacy
  • Reading: Intellectual Property and Types of Confidential Information
  • Video: Threats and Breaches 
  • Video: Microsoft Windows Server Lab Environment
  • Hands-on Lab: Windows Update
  • Video: Threat Types
  • Video: Phishing, Social Engineering, and Other Attacks
  • Activity: Identifying an Attack
  • Reading: Physical Security for Computing Devices
  • Reading: Case Study
  • Activity: Identifying Malware Threats 
  • Reading: Windows Defender Antivirus
  • Just for Fun - Hands-on Lab: Hacker Typer
  • Reading: Summary & Highlights
  • Practice Quiz: Common Security Threats and Risks
  • Graded Quiz: Common Security Threats and Risks
  • Discussion Prompt: Introduce Yourself
Module 2: Security Best Practices 
  • Video: Password Management Techniques  
  • Video: Authentication and SSO
  • Hands-on Lab: Enforce Strong Password Policies
  • Video: Security Threats: Access Control, Authorization, and Authentication
  • Video: Hardening Devices
  • Reading: Firewalls
  • Hands-on Lab: Windows Firewall with Advanced Security
  • Video: Security Threats: Validation and Device Usage
  • Video: Security Threats: Encryption Concepts
  • Video: Managing Email and Spam
  • Activity: Identifying Phishing Attempts
  • Reading: Data continuity and Encryption
  • Reading: Password Management
  • Reading: Summary & Highlights
  • Practice Quiz: Security Best Practices 
  • Graded Quiz: Security Best Practices 
Module 3: Safe Browsing Practices
  • Video: Safe Browsing Practices: Application Ecosystem Security
  • Video: Safe Browsing Practices: Public Browsing Risks
  • Video: Safe Browsing Practices: Plug-ins, Extensions, and Toolbars
  • Video: Security Threats: Safe Browsing Techniques
  • Hands-on Lab: Managing Browser Security and Privacy Settings
  • Video: Virtual Private Networks
  • Reading: Summary & Highlights
  • Practice Quiz: Safe Browsing Practices
  • Graded Quiz: Safe Browsing Practices
Module 4: Final Project and Final Exam
  • Reading: Case Study: Data Breach Yahoo!
  • Final Exam: Beginners Guide to Cybersecurity
  • Reading: Final Project: About this Project
  • Hands-on Lab: Perform Final Project Tasks
  • Hands-on Lab: Final Project Submission and Evaluation
  • Course Wrap Up
  • Reading: Glossary: Introduction to Cybersecurity Essentials
  • Reading: Congrats and Next Steps
  • Reading: Thanks from the Course Team
  • Course Rating and Feedback
  • Reading
  • Badge
  • Reading: How to Claim Your Certificate
  • Reading: Badge

What You'll Learn

  • Learn how to identify common cybersecurity threats, including malware, social engineering, breaches, and other attack vectors 
  • Install software updates and patches, and apply authentication, encryption, and device-hardening techniques to protect sensitive information 
  • Explore physical security, environmental safeguards, and access control measures used to prevent unauthorized access and ensure business continuity 
  • Apply cybersecurity best practices using strong password creation and management strategies, and identify use cases for encryption


Instructors

Rav Ahuja

Global Program Director, IBM Skills Network

Rav Ahuja is a Global Program Director at IBM. He leads growth strategy, curriculum creation, and partner programs for the IBM Skills Network. Rav co-founded Cognitive Class, an IBM led initiative to democratize skills for in demand technologies. He is based out of the IBM Canada Lab in Toronto and specializes in instructional solutions for AI, Data, Software Engineering and Cloud. Rav presents at events worldwide and has authored numerous papers, articles, books and courses on subjects in managing and analyzing data. Rav holds B. Eng. from McGill University and MBA from University of Western Ontario.

Read more