MG
Apr 25, 2020
Very solid course. Quick overview about almost everything you need to know at the beginning. A lot of useful links with additional material to study. Thanks a lot for sharing the knowledge, indeed!
TC
May 11, 2020
Knowledge delivery is exceptional. Content is to the point and the tests really pinpoint the attention level of the volunteer taking the course.Thank you for designing such a knowledgeable course
By andrew_morkel
鈥Apr 9, 2021
Excellent content. Good overview of various OS, including Win 10, Linux, and Mac. I enjoyed the industry readings such as OWASP.
By Muhammad S
鈥Mar 17, 2021
This course provides a basic level of knowledge of cloud computing models and operating system commands and their file systems.
By Vibhanshu s
鈥Aug 30, 2020
Provides the information that it was intended to provide, which is basics of cybersecurity roles, process and operating systems
By Md. M S
鈥Dec 12, 2021
its a helpful course to learn about basic of Cybersecurity roles and operating system security. thanks IBM, thanks instructors
By Dwayne N
鈥Apr 5, 2020
I loved it, the course has just the right information. Though it it can be tough at times. but worthwhile and very beneficial.
By Eugene C K A
鈥Jul 8, 2022
Great material no too difficult for beginner and lots of resources from to let you learn more. This is just a stepping stone.
By ChuanHao L
鈥Dec 29, 2022
Very professional courses and the supporting materials. It is really convenient to apply the knowledge learned to real work.
By Nurfadilah
鈥Sep 30, 2022
Thank you so much for the helpful courses, it helps me so much to enrich my knowledge to the next level about Cybersecurity!
By Mapitsa M
鈥Apr 10, 2022
what an awesome' way of learning cyber security it's the future. Mant thanks to. IBM for the amazing way of learning. 馃憣馃彫馃挴
By Lakshay P
鈥Oct 9, 2019
At first i was hating this course design but now..its really great only what we need pay attention on videos and make notes.
By Saravanaguru R K
鈥Jun 14, 2020
It is a good introductory level course to understand the fundamentals of Cyber Security, Cloud Computing and Virtualization
By URK18CS065 P R
鈥Dec 16, 2020
well informative,starting off with basics and ending up with a bit of cloud computing,overall happy to attend the course>3
By vivek p
鈥Feb 2, 2022
Cybersecurity Roles, Processes & OS Security is a great course for beginners who are interested in cybersecurity roles..
By NURUL W R K
鈥Aug 17, 2021
It was really helpful for me. Beside to increase my knowledge about security also about every unique platform. Thank you
By Parvathi n
鈥Aug 14, 2020
It is very useful,good pratice for me and to more details about cyber security roles, process &operating ayatem security
By YORELL D L V
鈥May 14, 2022
el curso me parecio perfecto ya que da los conocimientos necesarios sobre los sistemas operativos y como aprovecharlos
By Ahangama L Y B
鈥Oct 6, 2020
good course thank for all teachers for teaching me cybersecurity and otherr things then i rate 5 stars for this course
By Julio C M S
鈥Sep 22, 2020
The content of the course is quite good. The main points are summarized and shows the information in an efficient way.
By Anagha v
鈥Aug 14, 2020
It is very useful,it is good practice for me ,to know more details about cyber security roles and operating security.
By Ahmed B
鈥Jan 28, 2023
I LOVED the content, the slides are pretty good, I wish the sounds' quality were better but it's not an issue for me!
By Aamir M
鈥Jan 3, 2021
Practical orientation of the Tools should be added as its very informative but limited to theoretical concepts only.
By nuha a
鈥Dec 7, 2020
This course contains basic and important information regarding cybersecurity processes and OS security
Thank you all
By Ahmet C
鈥Jan 28, 2022
I really want to thank you the people who prepared the course for beginners. It's very granular and easy to follow.
By Sal S
鈥Aug 20, 2021
love learning about cloud and virtualization.
i loved learning iOS, even i've been an BB/android user my whole life.
By Alexandre S
鈥Nov 25, 2020
The course is really interesting in order to have a clean input of the roles, processes & operating system security