IBM - Cyber Security
The IBM Security threat-aware approach combines industry-leading identity and access management software and appliances with security analytics, arming you with tools to help detect anomalies, prevent fraud, block attacks and provide secure user access in today's mobile, cloud and social environments.
Module 1 : Applications Security Management
This module describes the web application security problems, Web Application Security Consortium (WASC ) Threat classifications, Top rated web application security vulnerabilities, threat modeling techniques to get the knowledge of challenges encountered in the developing of secured application. It gives the chance to understand the secure coding practices and the importance of testing in SDLC(Software Development Life Cycle) in terms of vulnerability detection and prevention.
Module 2 : Information Security – Identity Management
This module elucidates the significance of access management in any organization. It focuses on the IBM off the shelf software Tivoli Access Manager and its role in performing access management over resources.
Module 3 : Information Security – Access Management
This module is designed to teach participants the basic concepts and terminology of cloud computing and overview of IaaS and PaaS. It describes the various service delivery models of cloud computing architecture and the ways in which clouds can be deployed as public, private, hybrid, and community clouds. Students will learn about the security challenges that cloud deployments experience, and how they are addressed. Students will get awareness about IBM cloud computing architecture and offerings in IBM BlueMix Platform.