Authentication based attacks

Loading...
Do curso por University of Colorado System
Cyber Threats and Attack Vectors
114 classificações
University of Colorado System
114 classificações
Curso 2 de 4 em Specialization Cybersecurity for Business
Na lição
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY
Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

Conheça os instrutores

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science

Explore nosso catálogo

Registre-se gratuitamente e obtenha recomendações, atualizações e ofertas personalizadas.