├── CyberSecurity mod 1.pdf ├── CyberSecurity mod 2.pdf ├── CyberSecurity mod 3.pdf ├── CyberSecurity mod 4.pdf ├── CyberSecurity mod 5.pdf ├── CyberSecurity mod 6.pdf ├── CyberSecurity mod 7.pdf └── README.md /CyberSecurity mod 1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Indrajith-S/Cybersecurity-Analyst-Notes/b387d298cf72d42b0f02b4c139032e535d9e7aa7/CyberSecurity mod 1.pdf -------------------------------------------------------------------------------- /CyberSecurity mod 2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Indrajith-S/Cybersecurity-Analyst-Notes/b387d298cf72d42b0f02b4c139032e535d9e7aa7/CyberSecurity mod 2.pdf -------------------------------------------------------------------------------- /CyberSecurity mod 3.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Indrajith-S/Cybersecurity-Analyst-Notes/b387d298cf72d42b0f02b4c139032e535d9e7aa7/CyberSecurity mod 3.pdf -------------------------------------------------------------------------------- /CyberSecurity mod 4.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Indrajith-S/Cybersecurity-Analyst-Notes/b387d298cf72d42b0f02b4c139032e535d9e7aa7/CyberSecurity mod 4.pdf -------------------------------------------------------------------------------- /CyberSecurity mod 5.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Indrajith-S/Cybersecurity-Analyst-Notes/b387d298cf72d42b0f02b4c139032e535d9e7aa7/CyberSecurity mod 5.pdf -------------------------------------------------------------------------------- /CyberSecurity mod 6.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Indrajith-S/Cybersecurity-Analyst-Notes/b387d298cf72d42b0f02b4c139032e535d9e7aa7/CyberSecurity mod 6.pdf -------------------------------------------------------------------------------- /CyberSecurity mod 7.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Indrajith-S/Cybersecurity-Analyst-Notes/b387d298cf72d42b0f02b4c139032e535d9e7aa7/CyberSecurity mod 7.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # IBM Cybersecurity Analyst Professional Certificate Notes 2 | 3 | Welcome to the IBM Cybersecurity Analyst Professional Certificate Notes repository! This repository contains my handwritten notes from the IBM Cybersecurity Analyst Professional certification program. These notes are intended to serve as a valuable resource for anyone interested in gaining insights into the field of cybersecurity. 4 | 5 | ## Topics Covered 6 | 7 | - Network Security 8 | - Incident Response 9 | - Threat Intelligence 10 | - Security Operations 11 | - Cloud Security 12 | - Risk Management 13 | - Compliance and Regulations 14 | 15 | ## About the Notes 16 | 17 | These notes are a compilation of my studies, practical experiences, and insights gained during the IBM Cybersecurity Analyst Professional certification journey. They are organized by topic, making it easier to navigate and find relevant information quickly. 18 | 19 | Feel free to explore, use, and contribute to this repository. If you find any errors, have suggestions for improvements, or would like to add your own insights, please consider opening an issue or submitting a pull request. Collaboration is key to enhancing our collective knowledge in the cybersecurity field. 20 | 21 | ## How to Use 22 | 23 | You can browse the notes by navigating through the folders based on the topics of interest. Each topic contains detailed notes, diagrams, and explanations to help you grasp key concepts. 24 | 25 | To contribute, follow these steps: 26 | 27 | 1. Fork the repository 28 | 2. Create a new branch for your changes 29 | 3. Make your changes and improvements 30 | 4. Open a pull request describing your contributions 31 | 32 | ## Connect with Me 33 | 34 | Let's connect and continue our cybersecurity learning journey together! Feel free to connect with me on LinkedIn: https://www.linkedin.com/in/indrajithsb/ 35 | 36 | ## Disclaimer 37 | 38 | These notes are for educational purposes only and are not a substitute for official IBM course materials or documentation. Use them as a supplement to your studies and practical experiences. 39 | 40 | Happy learning and stay secure! 41 | --------------------------------------------------------------------------------