<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=LII%3ACybersecurity_Compliance_and_System_Administration</id>
	<title>LII:Cybersecurity Compliance and System Administration - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=LII%3ACybersecurity_Compliance_and_System_Administration"/>
	<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Cybersecurity_Compliance_and_System_Administration&amp;action=history"/>
	<updated>2026-04-05T22:56:00Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://www.limswiki.org/index.php?title=LII:Cybersecurity_Compliance_and_System_Administration&amp;diff=52277&amp;oldid=prev</id>
		<title>Shawndouglas: Updated</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Cybersecurity_Compliance_and_System_Administration&amp;diff=52277&amp;oldid=prev"/>
		<updated>2023-06-12T17:23:57Z</updated>

		<summary type="html">&lt;p&gt;Updated&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:23, 12 June 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l6&quot;&gt;Line 6:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 6:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''License for content''': Unknown&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''License for content''': Unknown&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Publication date''': &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2022&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Publication date''': &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2023&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This is an IBM-created course that is released on the edX platform. The four-week course is designed to help learners &amp;quot;Build the background needed to understand key [[cybersecurity]] compliance and industry standards.&amp;quot; The course is free to take and requires three to four hours of focus per week. A verified certificate of completion from IBM is available afterwards for $149 USD.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This is an IBM-created course that is released on the edX platform. The four-week course is designed to help learners &amp;quot;Build the background needed to understand key [[cybersecurity]] compliance and industry standards.&amp;quot; The course is free to take and requires three to four hours of focus per week. A verified certificate of completion from IBM is available afterwards for $149 USD.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l50&quot;&gt;Line 50:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 50:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===The course===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===The course===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[File:PDF.png|40px|link=https://www.edx.org/course/cybersecurity-system-administration-and-framework-security]]: The course can be found on the edX site, under the [https://www.edx.org/course/cybersecurity-system-administration-and-framework-security Computer Science] category. The session &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;is open as &lt;/del&gt;of &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;May 7&lt;/del&gt;, with eligibility for the &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;verified &lt;/del&gt;track closing July &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;5&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[File:PDF.png|40px|link=https://www.edx.org/course/cybersecurity-system-administration-and-framework-security]]: The course can be found on the edX site, under the [https://www.edx.org/course/cybersecurity-system-administration-and-framework-security Computer Science] category. The session &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;opened in the spring &lt;/ins&gt;of &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2023&lt;/ins&gt;, with eligibility for the &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;audit &lt;/ins&gt;track closing July &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;10&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;!--Place all category tags here--&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;!--Place all category tags here--&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:LII:Courses]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:LII:Courses]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-48203:rev-52277 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=LII:Cybersecurity_Compliance_and_System_Administration&amp;diff=48203&amp;oldid=prev</id>
		<title>Shawndouglas: Created as needed.</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Cybersecurity_Compliance_and_System_Administration&amp;diff=48203&amp;oldid=prev"/>
		<updated>2022-06-07T18:29:58Z</updated>

		<summary type="html">&lt;p&gt;Created as needed.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[File:EdX.svg|right|240px]]&lt;br /&gt;
'''Title''': ''Cybersecurity Compliance and System Administration''&lt;br /&gt;
&lt;br /&gt;
'''Author for citation''': Coreen Ryskamp&lt;br /&gt;
&lt;br /&gt;
'''License for content''': Unknown&lt;br /&gt;
&lt;br /&gt;
'''Publication date''': 2022&lt;br /&gt;
&lt;br /&gt;
This is an IBM-created course that is released on the edX platform. The four-week course is designed to help learners &amp;quot;Build the background needed to understand key [[cybersecurity]] compliance and industry standards.&amp;quot; The course is free to take and requires three to four hours of focus per week. A verified certificate of completion from IBM is available afterwards for $149 USD.&lt;br /&gt;
&lt;br /&gt;
The edX course description:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;In this course you will hear from IBM Cybersecurity specialists who will share their expertise from supporting some of the world’s largest organizations.&lt;br /&gt;
&lt;br /&gt;
Various compliance and industry standards will be discussed including standards from the National Institute of Standards and Technology (NIST), Center of Internet (CIS) controls and International Organization for Standardization (ISO).&lt;br /&gt;
&lt;br /&gt;
Global considerations will be addressed around the General Data Protection Regulation (GDPR).&lt;br /&gt;
&lt;br /&gt;
Data protection regulations concerning personal data including phone number, credit card information and other sensitive data for healthcare and credit cards are reviewed.&lt;br /&gt;
&lt;br /&gt;
You will learn the basic commands for user and server administration as it relates to information security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.&lt;br /&gt;
&lt;br /&gt;
You will learn the concepts of endpoint security and patch management. Both of these topics are important to keep systems current to avoid cybersecurity risks against an organization.&lt;br /&gt;
&lt;br /&gt;
Finally you will learn in depth skills around cryptography and encryption to understand how these concepts affect software within a company.&lt;br /&gt;
&lt;br /&gt;
What you'll learn:&lt;br /&gt;
&lt;br /&gt;
* Describe the challenges organizations face which require compliance and regulation.&lt;br /&gt;
* Describe the key privacy and data protection requirements for GDPR.&lt;br /&gt;
* Define the three rules established as standards for the Health Insurance Portability and Accountability Act (HIPAA).&lt;br /&gt;
* Describe the Payment Card Industry Data Security Standard (PCI DSS).&lt;br /&gt;
* Describe the differences between basic, foundational and organizational Center for Internet Security (CIS) controls.&lt;br /&gt;
* Describe the basics of endpoint protection and response.&lt;br /&gt;
* Understand why patching is important to avoid cybersecurity threats.&lt;br /&gt;
* Describe the principle of least privileges.&lt;br /&gt;
* Describe Windows and Linux security management considerations.&lt;br /&gt;
* Define cryptography and encryption.&lt;br /&gt;
* Define common pitfalls of cryptography.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the authors'''&lt;br /&gt;
&lt;br /&gt;
The course is taught by Coreen Ryskamp, Program manager with IBM Security Learning Services. &amp;quot;Coreen has many years of experience collaborating with business partners, startups and academia to create unique programs around technology, industry and skills development. Most recently Coreen has over 30 years experience in Project Management and Information Technology.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==General layout and contents of the course==&lt;br /&gt;
The course is split out into four modules. The first module describes cybersecurity compliance frameworks and standards and how they are best approached. Next, the second module discusses the concept of client systems administration, endpoint protection, and patching. The third module examines the use of system tools to administrate users and servers. The final module then closes with the application of cryptography to data and its different digital states, as well as the discussion of common compliance pitfalls.&lt;br /&gt;
&lt;br /&gt;
===The course===&lt;br /&gt;
[[File:PDF.png|40px|link=https://www.edx.org/course/cybersecurity-system-administration-and-framework-security]]: The course can be found on the edX site, under the [https://www.edx.org/course/cybersecurity-system-administration-and-framework-security Computer Science] category. The session is open as of May 7, with eligibility for the verified track closing July 5.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Place all category tags here--&amp;gt;&lt;br /&gt;
[[Category:LII:Courses]]&lt;/div&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
</feed>