This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.
Informações sobre o curso
Habilidades que você terá
- 5 stars74,82%
- 4 stars19,73%
- 3 stars3,63%
- 2 stars0,93%
- 1 star0,85%
Principais avaliações do INTRODUCTION TO CYBER ATTACKS
I love this instructor. He makes learning a lot more fun , especially when he gives a real world description of the point he's trying to get across. Well done :) Thanks for this course!
The course is so much interesting, well-organized and very attractive tha is why I finish it within short period of time. And the teacher is very nice guy and I appreciate him a lot.
I'm so glad I could complete this course as I look forward to continuing other courses on Cyber attacks. Its been helpful as it gave me the background knowledge as to what is needed in Cyber Security.
Good introduction for someone that are new to cyber security to look fundamental aspect of cyber security itself which provide high level understanding rather than dive into technical details.
Sobre Programa de cursos integrados Introduction to Cyber Security
Perguntas Frequentes – FAQ
Quando terei acesso às palestras e às tarefas?
O que recebo ao me inscrever nesta Especialização?
Existe algum auxílio financeiro disponível?
Mais dúvidas? Visite o Central de Ajuda ao estudante.