Cyber Security Fundamentals

Global cyber security expert and event content presents current principles, topics and threats, and demonstrates how IBM products are used to solve complex security problems.

Cyber Security Fundamentals Courses:

Cryptography in simple terms

Jose Bravo explains modern cryptography using easily-understood terminology and a whiteboard.

  • Symmetric encryption
  • Asymmetric encryption
  • Encryption standards, speeds, key sizes, etc.

How Passwords get Compromised

A Jose Bravo whiteboard explanation of how passwords can be compromised despite being encrypted by hash functions as soon as they are entered.

IBM Data Responsibility and the GDPR

The General Data Protection Regulation (GDPR) could have a real impact on your whole organization - your people, your suppliers and your business partners. This video will give you an idea of the broad scope of the GDPR, covering four main areas: security, data subject rights, consent, and privacy by design; as well as an outline of how IBM can help you on your path to GDPR readiness.

Introduction to IP and TCP v4 Headers

This presentation provides a detailed look at the TCP and IP version 4 headers, what they are for, and how TCP/IP works.

  • Introduction to IP - What it is for?
  • First header in an IP V4 packet
  • TCP setup and termination
  • TCP sequence and acknowledgement numbers

Linked Data Analysis: A Key to Basic Cyber Threat Analytics

The use of Linked Data analysis in accomplishing Cyber Threat Analytics is fundamental to almost all the suggested processes to accomplish successful Cyber Analysis. The ability to discover relationships among perpetrators of Cyber based attacks is key in verifying the entire breadth of the attack.

This course provides a progressive set of training materials to familiarize yourself with the concepts around Linked Data Analysis, with the last video showing an example of a specific Cyber Threat situation tracked down via the IBM i2 Analyst Notebook tooling that assists you in performing this work.

Security Encryption Foundations: Encryption versus Encoding

There is a general misconception across many companies around the difference between Encrypting data and Encoding data.

Here is a classic example of an employee for a fictional company that is using one tool thinking she is protecting her key financial data via encrypting it, when she is actually only encoding the data.