18
Skill Up with IBM; How to Start Your Career in Cybersecurity Version 1| October 21, 2021

Skill Up with IBM; How to Start Your Career in Cybersecurity

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Skill Up with IBM; How to Start Your Career in Cybersecurity

Skill Up with IBM How to Start Your Career in Cybersecurity

Version 1| October 21 2021

Todayrsquos Topics

IBM Security copy IBM Corporation 2021 2

bull Why Cybersecurity Oscar Calderon

bull What will I do all day Kenneth Gonzalez

bull Now What Coreen Ryskamp

What is Cybersecurity

IBM Security copy IBM Corporation 2021 3

bull Focus to protect data from cyber attacks and data breaches (Confidentiality Integrity Availability)

bull In 2020 the average cost of a data breach was USD 386 million globally and USD 864 million in the United States

bull Prevent bad reputation and enable operations (Protect to Enable)

Why Cybersecurity

IBM Security copy IBM Corporation 2021 4

bull Everchanging Environment

bull 0 Unemployment rate (35 Million Openings by 2021)

bull Digital Transformation (COVID pushed this forward)

bull Jobs with Real Impact

A day in a life

Cybersecurity Analyst Pentester

Average number of outstanding vulnerabilities in client environments

Source X-Force Red vulnerability management client statistics

IBM Security copy 2021 IBM Corporation 6

Application

bull Web

bull Mobile

bull Terminal

bull Thick-client

bull Mainframe

bull Middleware

bull Cloud

Network

bull Internal

bull External

bull Wireless

bull Other radio frequencies

bull SCADA

Human

bull Physical

bull Social engineering

bull Phishing

Pentester

What could they dohellip

IBM Security copy 2019 IBM Corporation 7

Hardware amp embedded devices

bull IoT

bull Wearable tech

bull Point-of-sale

bull ATMs

bull Self-checkout kiosks

Now the Cybersecurity Analyst point of view

8

bull Identify threats

mdash Understand the risk and why the threat is relevant

mdash Understand the context of the threat

mdash Escalate and alert

mdash Recommendations and continuum monitoring

Now What

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 2: Skill Up with IBM; How to Start Your Career in Cybersecurity

Todayrsquos Topics

IBM Security copy IBM Corporation 2021 2

bull Why Cybersecurity Oscar Calderon

bull What will I do all day Kenneth Gonzalez

bull Now What Coreen Ryskamp

What is Cybersecurity

IBM Security copy IBM Corporation 2021 3

bull Focus to protect data from cyber attacks and data breaches (Confidentiality Integrity Availability)

bull In 2020 the average cost of a data breach was USD 386 million globally and USD 864 million in the United States

bull Prevent bad reputation and enable operations (Protect to Enable)

Why Cybersecurity

IBM Security copy IBM Corporation 2021 4

bull Everchanging Environment

bull 0 Unemployment rate (35 Million Openings by 2021)

bull Digital Transformation (COVID pushed this forward)

bull Jobs with Real Impact

A day in a life

Cybersecurity Analyst Pentester

Average number of outstanding vulnerabilities in client environments

Source X-Force Red vulnerability management client statistics

IBM Security copy 2021 IBM Corporation 6

Application

bull Web

bull Mobile

bull Terminal

bull Thick-client

bull Mainframe

bull Middleware

bull Cloud

Network

bull Internal

bull External

bull Wireless

bull Other radio frequencies

bull SCADA

Human

bull Physical

bull Social engineering

bull Phishing

Pentester

What could they dohellip

IBM Security copy 2019 IBM Corporation 7

Hardware amp embedded devices

bull IoT

bull Wearable tech

bull Point-of-sale

bull ATMs

bull Self-checkout kiosks

Now the Cybersecurity Analyst point of view

8

bull Identify threats

mdash Understand the risk and why the threat is relevant

mdash Understand the context of the threat

mdash Escalate and alert

mdash Recommendations and continuum monitoring

Now What

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 3: Skill Up with IBM; How to Start Your Career in Cybersecurity

What is Cybersecurity

IBM Security copy IBM Corporation 2021 3

bull Focus to protect data from cyber attacks and data breaches (Confidentiality Integrity Availability)

bull In 2020 the average cost of a data breach was USD 386 million globally and USD 864 million in the United States

bull Prevent bad reputation and enable operations (Protect to Enable)

Why Cybersecurity

IBM Security copy IBM Corporation 2021 4

bull Everchanging Environment

bull 0 Unemployment rate (35 Million Openings by 2021)

bull Digital Transformation (COVID pushed this forward)

bull Jobs with Real Impact

A day in a life

Cybersecurity Analyst Pentester

Average number of outstanding vulnerabilities in client environments

Source X-Force Red vulnerability management client statistics

IBM Security copy 2021 IBM Corporation 6

Application

bull Web

bull Mobile

bull Terminal

bull Thick-client

bull Mainframe

bull Middleware

bull Cloud

Network

bull Internal

bull External

bull Wireless

bull Other radio frequencies

bull SCADA

Human

bull Physical

bull Social engineering

bull Phishing

Pentester

What could they dohellip

IBM Security copy 2019 IBM Corporation 7

Hardware amp embedded devices

bull IoT

bull Wearable tech

bull Point-of-sale

bull ATMs

bull Self-checkout kiosks

Now the Cybersecurity Analyst point of view

8

bull Identify threats

mdash Understand the risk and why the threat is relevant

mdash Understand the context of the threat

mdash Escalate and alert

mdash Recommendations and continuum monitoring

Now What

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 4: Skill Up with IBM; How to Start Your Career in Cybersecurity

Why Cybersecurity

IBM Security copy IBM Corporation 2021 4

bull Everchanging Environment

bull 0 Unemployment rate (35 Million Openings by 2021)

bull Digital Transformation (COVID pushed this forward)

bull Jobs with Real Impact

A day in a life

Cybersecurity Analyst Pentester

Average number of outstanding vulnerabilities in client environments

Source X-Force Red vulnerability management client statistics

IBM Security copy 2021 IBM Corporation 6

Application

bull Web

bull Mobile

bull Terminal

bull Thick-client

bull Mainframe

bull Middleware

bull Cloud

Network

bull Internal

bull External

bull Wireless

bull Other radio frequencies

bull SCADA

Human

bull Physical

bull Social engineering

bull Phishing

Pentester

What could they dohellip

IBM Security copy 2019 IBM Corporation 7

Hardware amp embedded devices

bull IoT

bull Wearable tech

bull Point-of-sale

bull ATMs

bull Self-checkout kiosks

Now the Cybersecurity Analyst point of view

8

bull Identify threats

mdash Understand the risk and why the threat is relevant

mdash Understand the context of the threat

mdash Escalate and alert

mdash Recommendations and continuum monitoring

Now What

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 5: Skill Up with IBM; How to Start Your Career in Cybersecurity

A day in a life

Cybersecurity Analyst Pentester

Average number of outstanding vulnerabilities in client environments

Source X-Force Red vulnerability management client statistics

IBM Security copy 2021 IBM Corporation 6

Application

bull Web

bull Mobile

bull Terminal

bull Thick-client

bull Mainframe

bull Middleware

bull Cloud

Network

bull Internal

bull External

bull Wireless

bull Other radio frequencies

bull SCADA

Human

bull Physical

bull Social engineering

bull Phishing

Pentester

What could they dohellip

IBM Security copy 2019 IBM Corporation 7

Hardware amp embedded devices

bull IoT

bull Wearable tech

bull Point-of-sale

bull ATMs

bull Self-checkout kiosks

Now the Cybersecurity Analyst point of view

8

bull Identify threats

mdash Understand the risk and why the threat is relevant

mdash Understand the context of the threat

mdash Escalate and alert

mdash Recommendations and continuum monitoring

Now What

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 6: Skill Up with IBM; How to Start Your Career in Cybersecurity

Average number of outstanding vulnerabilities in client environments

Source X-Force Red vulnerability management client statistics

IBM Security copy 2021 IBM Corporation 6

Application

bull Web

bull Mobile

bull Terminal

bull Thick-client

bull Mainframe

bull Middleware

bull Cloud

Network

bull Internal

bull External

bull Wireless

bull Other radio frequencies

bull SCADA

Human

bull Physical

bull Social engineering

bull Phishing

Pentester

What could they dohellip

IBM Security copy 2019 IBM Corporation 7

Hardware amp embedded devices

bull IoT

bull Wearable tech

bull Point-of-sale

bull ATMs

bull Self-checkout kiosks

Now the Cybersecurity Analyst point of view

8

bull Identify threats

mdash Understand the risk and why the threat is relevant

mdash Understand the context of the threat

mdash Escalate and alert

mdash Recommendations and continuum monitoring

Now What

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 7: Skill Up with IBM; How to Start Your Career in Cybersecurity

Application

bull Web

bull Mobile

bull Terminal

bull Thick-client

bull Mainframe

bull Middleware

bull Cloud

Network

bull Internal

bull External

bull Wireless

bull Other radio frequencies

bull SCADA

Human

bull Physical

bull Social engineering

bull Phishing

Pentester

What could they dohellip

IBM Security copy 2019 IBM Corporation 7

Hardware amp embedded devices

bull IoT

bull Wearable tech

bull Point-of-sale

bull ATMs

bull Self-checkout kiosks

Now the Cybersecurity Analyst point of view

8

bull Identify threats

mdash Understand the risk and why the threat is relevant

mdash Understand the context of the threat

mdash Escalate and alert

mdash Recommendations and continuum monitoring

Now What

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 8: Skill Up with IBM; How to Start Your Career in Cybersecurity

Now the Cybersecurity Analyst point of view

8

bull Identify threats

mdash Understand the risk and why the threat is relevant

mdash Understand the context of the threat

mdash Escalate and alert

mdash Recommendations and continuum monitoring

Now What

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 9: Skill Up with IBM; How to Start Your Career in Cybersecurity

Now What

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 10: Skill Up with IBM; How to Start Your Career in Cybersecurity

What do I need

IBM Security copy 2021 IBM Corporation 10

Donrsquot be afraid You need to believe in yourself to make it happen

Motivation to learn Therersquos something new to learn every day

Develop People Skills You need more than technical knowledge to be a good Security Specialist

Technical Skills Cybersecurity requires knowledge in many technical fields We must know a little about everything

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 11: Skill Up with IBM; How to Start Your Career in Cybersecurity

People Skills

IBM Security copy 2021 IBM Corporation 11

Most wanted skills

bull Problem Solving Critical Thinking

bull Communication Skills

bull Be able to work with minimum supervision

bull Time Management (SLAs SLOs)

bull Standards and methodologies

bull Agile

bull Scrum

bull ITIL

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 12: Skill Up with IBM; How to Start Your Career in Cybersecurity

Technical Skills

IBM Security copy 2021 IBM Corporation 12

Basic Skills

bull Computer Networks

bull Linux Operating Systems

bull Windows Operating Systems

bull Programming and Software Development

bull Analysis of payloads and events

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 13: Skill Up with IBM; How to Start Your Career in Cybersecurity

Common Cybersecurity Roles

IBM Security copy 2021 IBM Corporation 13

bull Security Analyst

bull Pentester

bull Threat Intelligence Analyst

bull Incident Responder

bull Cyber Threat Analyst

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 14: Skill Up with IBM; How to Start Your Career in Cybersecurity

Stay updated

IBM Security copy 2021 IBM Corporation 14

Therersquos a new attack or malicious software every day

Besides having technical knowledge you need to understand whatrsquos happening in the Cybersecurity world

Look for trusted sources

- National Institute of Standards and Technology (NIST)

- IBM X-Force Exchange

- Cybersecurity amp Infrastructure Security Agency

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 15: Skill Up with IBM; How to Start Your Career in Cybersecurity

IBMrsquos Skills Initiative

IBM Security copy IBM Corporation 2021 15

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 16: Skill Up with IBM; How to Start Your Career in Cybersecurity

16

bull IBM Cybersecurity Analyst Professional Certificate on Coursera (First month Free)

bull IBM Cybersecurity Fundamentals on edX

bull IBM Skillsbuild

bull IBM Security Learning Academy

bull IBM Security Community Skills and Learning

Resources

IBM Security copy IBM Corporation 2021

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 17: Skill Up with IBM; How to Start Your Career in Cybersecurity

copy Copyright IBM Corporation 2021 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any kind express or implied Any statement of direction represents IBMrsquos current intent is subject to change or withdrawal and represent only goals and objectives IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other systems products or services to be most effective IBM does not warrant that any systems products or services are immune from or will make your enterprise immune from the malicious or illegal conduct of any party

Follow us on

ibmcomsecurity

securityintelligencecom

ibmcomsecuritycommunity

xforceibmcloudcom

ibmsecurity

youtubecomibmsecurity

Thank you

Page 18: Skill Up with IBM; How to Start Your Career in Cybersecurity