Cyber Security Fundamentals
Global cyber security expert and event content presents current principles, topics and threats, and demonstrates how IBM products are used to solve complex security problems.
Cyber Security Fundamentals Courses:
Jose Bravo explains modern cryptography using easily-understood terminology and a whiteboard.
- Symmetric encryption
- Asymmetric encryption
- Encryption standards, speeds, key sizes, etc.
A Jose Bravo whiteboard explanation of how passwords can be compromised despite being encrypted by hash functions as soon as they are entered.
The General Data Protection Regulation (GDPR) could have a real impact on your whole organization - your
people, your suppliers and your business partners. This video will give
you an idea of the broad scope of the GDPR, covering four main areas: security, data subject rights, consent, and privacy by design; as well
as an outline of how IBM can help you on your path to GDPR readiness.
This presentation provides a detailed look at the TCP and IP version 4 headers, what they are for, and how TCP/IP works.
- Introduction to IP - What it is for?
- First header in an IP V4 packet
- TCP setup and termination
- TCP sequence and acknowledgement numbers
The use of Linked Data analysis in accomplishing Cyber Threat Analytics is fundamental to almost all the suggested processes to accomplish successful Cyber Analysis. The ability to discover relationships among perpetrators of Cyber based attacks is key in verifying the entire breadth of the attack.
This course provides a progressive set of training materials to familiarize yourself with the concepts around Linked Data Analysis, with the last video showing an example of a specific Cyber Threat situation tracked down via the IBM i2 Analyst Notebook tooling that assists you in performing this work.
There is a general misconception across many companies around the difference between Encrypting data and Encoding data.
Here is a classic example of an employee for a fictional company that is using one tool thinking she is protecting her key financial data via encrypting it, when she is actually only encoding the data.