This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.
Acerca de este Curso
Habilidades que obtendrás
- 5 stars74,94 %
- 4 stars19,56 %
- 3 stars3,62 %
- 2 stars1,03 %
- 1 star0,83 %
Principales reseñas sobre INTRODUCTION TO CYBER ATTACKS
its a awesome course.it fills us with knowledge and also spread awareness about different types of cyber attacks and how to prevent ourselves. it also adds my skills list to my resume.
There's an issue with the final quiz. The directions indicate a figure to be referenced, but the figure is not available. How can the quiz be properly completed without the figure?
I'm so glad I could complete this course as I look forward to continuing other courses on Cyber attacks. Its been helpful as it gave me the background knowledge as to what is needed in Cyber Security.
It was a really good introductory course. I have had a great insight into the cybersecurity field and also to the business side of cybersecurity. And Ed is a really great instructor
Acerca de Programa especializado: Introduction to Cyber Security
¿Cuándo podré acceder a las lecciones y tareas?
¿Qué recibiré si me suscribo a este Programa especializado?
¿Hay ayuda económica disponible?
¿Tienes más preguntas? Visita el Centro de Ayuda al Estudiante.