Chevron Left
Voltar para Cyber Threats and Attack Vectors

Cyber Threats and Attack Vectors, University of Colorado System

124 classificações
29 avaliações

Informações sobre o curso

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bearer of bad news, but threats are all over the place! This course isn’t designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you on how attacks are carried out so that you have a better sense of what to look out for in your business or with your systems....

Melhores avaliações

por VV

Apr 05, 2018

Great Intro and Follow-Up to First class, will be taking other Cyber-Security Classes to supplement this one and reinforce knowledge.

por RJ

Mar 14, 2018

Nice and easy course...but last week depends on how many people are currently pursuing this course so it may take some time.

Filtrar por:

28 avaliações


Nov 17, 2018

good course

por Merzyan Bhamgara

Nov 15, 2018

The course is highly recommended for people who wants to have a career in Cyber Security.

Greg is an encyclopedia and has wealth of knowledge on the subject matter.

por Shubin Evgenii Andreevich

Nov 08, 2018

Thats nice.

por Jane

Nov 05, 2018

Great content!


Oct 07, 2018

This course and all that comes with it has given me the knowledge and confident, at least to understand the good and the bad that lurks in the web.

I haven't finished yet ….

por Atichat Panno

Sep 24, 2018


por Matt

Sep 23, 2018

This is a great course the data breach assignment at the end was very interesting. It lead me to searching for more information on the internet about how a breach was discovered. I have always been interested in that aspect of the events.

por Regina Angela Molines

Aug 09, 2018


por juan pablo rosato

Jul 30, 2018

Excelente curso. Muy clara la explicacion.

por Aaron

Jul 11, 2018

Excellent content.