Chevron Left
Cybersecurity Roles, Processes & Operating System Security に戻る

IBM による Cybersecurity Roles, Processes & Operating System Security の受講者のレビューおよびフィードバック



This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: ● Understand the key cybersecurity roles within an Organization. ● List key cybersecurity processes and an example of each process. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile. ● Understand the concept of Virtualization as it relates to cybersecurity Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the second course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cybersecurity Roles, Processes & Operating System Security IBM digital badge. More information about the badge can be found here:



Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!


Knowledge delivery is exceptional. Content is to the point and the tests really pinpoint the attention level of the volunteer taking the course.Thank you for designing such a knowledgeable course


Cybersecurity Roles, Processes & Operating System Security: 51 - 75 / 667 レビュー

by Usama R


the overall sound quality was a bit hard to understand at some places but the information given and the way of teaching and the level of understanding all things were great.

by Rebecca P


The course provided a sound foundation of concepts to take a step-wise learning path to understand the requirements of operation and assurance of security. I learned alot!

by N'dri A T P


This course focuses on technical skills and process for IT security management, virtualization and cloud computing. You will learn all features of operating systems.

by Олеся К


Thank you for a very interesting and useful course! The information is well systematized and illustrated. Test items are interesting and understandable.

by Alnawaz M


Course material was very helpful. However, it would have been nice if the contents was cross referenced with the videos for language and comprehension.

by Pavan K M


Theory was a bit hard to go through but later on the Technical part will be easy if you are familiar with the Cybersecurity world Loved the course

by Andreea-Ioana B


I have easily learned so much precious information during this course! I definitely recommend this to anyone interested in the cybersecurity area.

by kumar r


ver y much interesting course as here we not only learns how cyber security threats occurs and how to deal with it and also about cloud computing

by Arjun B


I felt like this course is very good for understanding different topics in Cyber Security. It can be considered as basic knowledge in the field.

by Sai K


Very informative course for people interested in getting basic knowledge about cybersecurity. The topics are explained well by the instructors.

by lai y


For this whole Module to let me know more about the OS of Window ,Linux and Mac . Cloud Computing and …. i will continue to the next module

by Karan m


The audio quality is really bad, apart from a few lessons, most of the lectures are almost inaudible. Still a 5 star for the content.

by Devik J


This course is's good course for cyber security students and IT students and for that who have to learn cyber security.

by Farah A


Great overview and information regarding cybersecurity visualization, cloud security and computing, the ITIL life cycle and more.

by andrew_morkel


Excellent content. Good overview of various OS, including Win 10, Linux, and Mac. I enjoyed the industry readings such as OWASP.

by Muhammad S


This course provides a basic level of knowledge of cloud computing models and operating system commands and their file systems.

by Vibhanshu s


Provides the information that it was intended to provide, which is basics of cybersecurity roles, process and operating systems

by Md. M S


its a helpful course to learn about basic of Cybersecurity roles and operating system security. thanks IBM, thanks instructors

by Dwayne N


I loved it, the course has just the right information. Though it it can be tough at times. but worthwhile and very beneficial.

by Nurfadilah


Thank you so much for the helpful courses, it helps me so much to enrich my knowledge to the next level about Cybersecurity!

by Lakshay P


At first i was hating this course design but now..its really great only what we need pay attention on videos and make notes.

by saravanaguru


It is a good introductory level course to understand the fundamentals of Cyber Security, Cloud Computing and Virtualization

by URK18CS065 P R


well informative,starting off with basics and ending up with a bit of cloud computing,overall happy to attend the course>3



It was really helpful for me. Beside to increase my knowledge about security also about every unique platform. Thank you

by Parvathi n


It is very useful,good pratice for me and to more details about cyber security roles, process &operating ayatem security