Chevron Left
Zurück zu Detecting and Mitigating Cyber Threats and Attacks

Detecting and Mitigating Cyber Threats and Attacks, University of Colorado System

4.7
124 Bewertungen
23 Bewertungen

Über diesen Kurs

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach....

Top-Bewertungen

von JJ

Nov 05, 2017

Class doesn't seem very active-- not a lot of students so I had to wait awhile for peer reviewed assignments to get reviewed, but the content is great.

von SH

Jan 08, 2019

Best course to take. Thank you for helping me to improve my understanding about the Cyber Security

Filtern nach:

23 Bewertungen

von Jafed Encinas

May 14, 2019

Able to concentrate and stay focused for periods of several hours, even when tasks are relatively mundane, and doesn't make mistakes. He has a high boredom threshold. Always assured and confident in demeanour and presentation of ideas without being aggressively over-confident. No absences without valid reason in 6 months. Reaches a decision rapidly after taking account of all likely outcomes and estimating the route most likely to bring success. The decisions almost always turn out to be good ones.

This Course always completes any assignment on time and to a high standard. This Course has outstanding artistic or craft skills, bringing creativity and originality to the task. Aiming for a top job in the organization. He sets very high standards, aware that this will bring attention and promotion. This Course pays great attention to detail. He always presented work properly checked and completely free of error.

von Ochieng Raymond Ouko

May 11, 2019

The peer assignment is taking alot of time. It needs improvement

von Rakshit Malhotra

Apr 10, 2019

nice course

von Sreenivasulu S

Feb 19, 2019

Very Good source for learning on mitigating cyber attacks!

von Diego Macêdo

Jan 16, 2019

Great overview about the cybersecurity threats and some kind of attacks.

von SYED SIBT E HASSAN

Jan 08, 2019

Best course to take. Thank you for helping me to improve my understanding about the Cyber Security

von Jeff Brothis

Dec 31, 2018

Peer-reviewed assignment was identical to a previous course.

von David Manuel Rojas Rosales

Dec 26, 2018

Buen curso, buenos materiales y bastante recomendable.

von shehroz jehangir

Dec 19, 2018

Very good course and teacher is very good at explaining things. Learned alot from this course.

von Osama Bin Fazil

Nov 12, 2018

EXCELLENT COURSE