Chevron Left
Zurück zu Cyber Threats and Attack Vectors

Cyber Threats and Attack Vectors, University of Colorado System

4.6
166 Bewertungen
37 Bewertungen

Über diesen Kurs

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bearer of bad news, but threats are all over the place! This course isn’t designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you on how attacks are carried out so that you have a better sense of what to look out for in your business or with your systems....

Top-Bewertungen

von VV

Apr 05, 2018

Great Intro and Follow-Up to First class, will be taking other Cyber-Security Classes to supplement this one and reinforce knowledge.

von RJ

Mar 14, 2018

Nice and easy course...but last week depends on how many people are currently pursuing this course so it may take some time.

Filtern nach:

36 Bewertungen

von Jafed Encinas

May 14, 2019

Able to concentrate and stay focused for periods of several hours, even when tasks are relatively mundane, and doesn't make mistakes. He has a high boredom threshold. Always assured and confident in demeanour and presentation of ideas without being aggressively over-confident. No absences without valid reason in 6 months. Reaches a decision rapidly after taking account of all likely outcomes and estimating the route most likely to bring success. The decisions almost always turn out to be good ones.

This Course always completes any assignment on time and to a high standard. This Course has outstanding artistic or craft skills, bringing creativity and originality to the task. Aiming for a top job in the organization. He sets very high standards, aware that this will bring attention and promotion. This Course pays great attention to detail. He always presented work properly checked and completely free of error.

von Michael Ajao-olarinoye

Feb 20, 2019

a well explanatory course

von Sreenivasulu S

Feb 17, 2019

Excellent Course! which is helped in briefing on Attack Vectors.

von Richard Reifel

Feb 08, 2019

Very good course building on the CIA triad and other concepts shared in the previous.

von Satish Sha

Feb 05, 2019

Good. Its informative and effective

von Alexei Navolokin

Jan 28, 2019

great intro

von Habib Ullah

Jan 02, 2019

Excellent course to dive in Cyber Security Knowledge.

von Jeff Brothis

Dec 21, 2018

Excellent and informative. Lots of great information about data breaches, how they're discovered andwho was affected.

von DEEPAK UPADHYAY

Nov 17, 2018

good course

von Merzyan Bhamgara

Nov 15, 2018

The course is highly recommended for people who wants to have a career in Cyber Security.

Greg is an encyclopedia and has wealth of knowledge on the subject matter.