SMC BSc. in IT Security
IconHigher Education

SMC BSc. in IT Security

The Bachelor in Cyber Security program delivers the knowledge and skills to protect computer systems and networks from cyber threats, such as hackers, malware and viruses. You will also learn how to investigate and analyze digital evidence of cyber crimes, using various tools and techniques. Delivered via eLearning it is ideal for candidates with practical experience who do not possess the appropriate qualifications, aiming to obtain them by expanding and formalizing knowledge in the various fields of Cyber-Security. The program is strongly oriented towards practical application, rather than theory. It is a combination of academic content adapted for professionals, coupled with extensive industry-related exposure.

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: ● how various encryption algorithms and techniques work as well as their benefits and limitations. ● various authentication systems and types. ● the difference between authentication and authorization. ● how to evaluate potential risks and recommend ways to reduce risk. ● best practices for securing a network. ● how to help others to grasp security concepts and protect themselves.

The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. Ever wonder how your bank website is secure when you connect to it? Wonder how other business owners secure their network? Wonder how large data breaches happen? This is practical computer security. It will help you answer the question – what should I focus on?

Designed for beginners, this course is for anyone new to networking and storage. Kickstart an IT Support role or network technician role, or enhance your base knowledge for system administration. Videos, practice activities, and virtual hands-on labs will help you develop and apply the skills you need to diagnose and repair basic networking and storage issues so you can keep users connected. you'll learn about network types, topologies, and models, see how data travels across a network, and discover how protocols and standards enable all network activity. Then, you’ll learn how to set up and configure devices and cables for both wired and wireless networks. And then you’ll learn to diagnose and troubleshoot network connectivity issues and discover how to use command line utilities and network tools in Windows Settings. After that, you’ll identify different types of storage drives and discover the difference between short-term and long-term memory. Lastly, you’ll find out the features of local, offsite, and cloud storage and when to use each. And you’ll investigate file, block, and object storage and work out which cloud provider solutions work best for different networking scenarios.

This is a self-paced lab that takes place in the Google Cloud console. In this lab you will learn how to perform basic networking tasks on Google Cloud Platform by setting up a network and 3 subnetworks; and how GCP might differ from an on-premises setup. Connecting to Devices and Networks Practice managing devices and networks without installing anything! This course is designed for learners with no technical experience, providing a solid foundation of connecting to devices and networks. Learners will gain hands-on practice on an Ubuntu system that can be easily transferred to other Unix-based operating systems. The modules in this course cover managing devices and partitions, basic networking tools and name resolution, and securely transferring data over networks to create backups. To allow for a truly hands-on, self-paced learning experience, this course is video-free. Assignments contain short explanations with images and runnable examples with suggested edits to explore examples further, building a deeper understanding by doing. You'll benefit from instant feedback from a variety of assessment items along the way, gently progressing from quick understanding checks (multiple choice, fill in the blank, and un-scrambling code blocks) to small, approachable exercises that take minutes instead of hours.

Understanding statistics is essential to understand research in the social and behavioral sciences. In this course you will learn the basics of statistics; not just how to calculate them, but also how to evaluate them. This course will also prepare you for the next course in the specialization - the course Inferential Statistics. In the first part of the course we will discuss methods of descriptive statistics. You will learn what cases and variables are and how you can compute measures of central tendency (mean, median and mode) and dispersion (standard deviation and variance). Next, we discuss how to assess relationships between variables, and we introduce the concepts correlation and regression. The second part of the course is concerned with the basics of probability: calculating probabilities, probability distributions and sampling distributions. You need to know about these things in order to understand how inferential statistics work. The third part of the course consists of an introduction to methods of inferential statistics - methods that help us decide whether the patterns we see in our data are strong enough to draw conclusions about the underlying population we are interested in. We will discuss confidence intervals and significance tests. You will not only learn about all these statistical concepts, you will also be trained to calculate and generate these statistics yourself using freely available statistical software.

In this course, you will learn to analyze measurement systems for process stability and capability and why having a stable measurement process is imperative prior to performing any statistical analysis. You will analyze continuous measurement systems and statistically characterize both accuracy and precision using R software. You will perform measurement systems analysis for potential, short-term and long-term statistical control and capability. Additionally, you will learn how to assess a discrete measurement and perform analyses for internal consistency, concordance between assessors, and concordance with a standard. Finally, you will learn how to make decisions on measurement systems process improvement. This specialization can be taken for academic credit as part of CU Boulder’s Master of Science in Data Science (MS-DS) degree offered on the Coursera platform. The MS-DS is an interdisciplinary degree that brings together faculty from CU Boulder’s departments of Applied Mathematics, Computer Science, Information Science, and others. With performance-based admissions and no application process, the MS-DS is ideal for individuals with a broad range of undergraduate education and/or professional experience in computer science, information science, mathematics, and statistics.

Information systems (IS) are important assets to business organizations and are ubiquitous in our daily lives. With the latest IS technologies emerging, such as Big Data, FinTech, Virtual Banks, there are more concerns from the public on how organizations maintain systems’ integrity, such as data privacy, information security, the compliance to the government regulations. Management in organizations also need to be assured that systems work the way they expected. IS auditors play a crucial role in handling these issues. In the course “Information Systems Auditing, Controls and Assurance”, you will explore risks of information systems, and how to mitigate the risks by proper IS Controls. You will also get familiar with the IS Audit procedures and how they are applied during the IS development throughout the Systems Development Life Cycle (SDLC). Finally, you will get to observe how we can make the system changes more manageable using formal IS Management practices, such as Change Management Controls and Emergency Changes. The conversations between the course instructor - Prof. Percy Dias, and the IS auditing practitioner will give you a concrete idea on how IS auditors perform their duties, the qualities to become IS auditors and future prospects of IS auditing industry. This course is suitable for students and graduates from Information Systems, Information Technology and Computer Science, and IT practitioners who are interested to get into the IS auditing field. It is also a good starting point for learners who would like to pursue further studies for IS audit certifications – such as Certified Information Systems Auditor (CISA).

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. This course also gives you hands on access to cybersecurity tools important to a system analyst. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the sixth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cyber Threat Intelligence IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cyber-threat-intelligence. In this course, you will learn to: • Describe examples of network defensive tactics. • Discuss data loss prevention and endpoint protection concepts and tools. • Explore a data loss prevention tool and learn how to classify data in your database environment. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. • Identify the key concepts around threat intelligence. • Explore a SIEM product and review suspicious alerts and how to take action.

Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will come out with a basic understanding of cryptographic concepts and how to apply them, implement secure protocols, key management concepts, key administration and validation, and Public Key Infrastructure. Course Objectives 1. Apply the fundamental concepts of cryptography 2. Describe the difference between symmetric and asymmetric cryptography 3. Define the basic requirements for cryptography 4. Identify processes to support secure protocols 5. Describe the process for implementing cryptographic systems 6. Define key management concepts 7. Define Public Key Infrastructure 8. Identify processes for key administration and validation 9. Describe the implementation of secure protocols.

This specialization is intended for people with some programming experience who seek an approachable introduction to how operating systems work on a fundamental level. This course will equip learners with foundational knowledge of operating systems suitable for any developer roles. In these four courses, you will cover everything from the basics of a C program to distributed systems. These topics will help prepare you to optimize the performance of the programs you write.

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. The instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective. They will share their skills which they need to secure IBM and its clients security systems.

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a cybersecurity analyst. Throughout this specialization, you will learn concepts around digital forensics, penetration testing and incident response. You will learn about threat intelligence and tools to gather data to prevent an attack or in the event your organization is attacked. You will have the opportunity to review some of the largest breach cases and try your hand at reporting on a real world breach. The content creators and instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective. They will share their skills which they need to secure IBM and its clients security systems.

To learn more about qLearn click on the FAQ download button below.
This course includes

This course includes

  • Lectures Yes
  • Assessment Yes
  • Duration 1.5 Year
  • Skills Information Technology
  • Language English, French, Arabic, Russian
  • Certificate Yes

Related Courses

course image
Higher Education Information Technology
SMC BSc. in Information...

The Bachelor in IT prepares you for various careers in the field of information technology. It covers topics such as programming, database management, web development, network administration, cybersecurity, and artificial intelligence.

  • English
course image
Higher Education Management
SMC Master of Business...

Our online MBA (Master of Business Administration) program provides a well-balanced combination of academic and practical business content.

  • English, French, Russian, Arabic
course image
Higher Education Management
SMC Bachelor of Business...

The Online BBA (Bachelor in Business Administration) is a focused distance learning degree program that develops a thorough understanding of business and entrepreneurship.

  • English, French, Russian, Arabic
course image
Higher Education Technology
SMC Diploma In Blockchain...

This course is for students wishing to explore blockchain technology's potential use.

  • English
course image
Higher Education DBA
SMC Diploma in Business...

The Diploma in Business and Management is an advanced level qualification, which may serve advantageous for many higher level positions for countless businesses.

  • English