Introduction

Loading...
Lehrplan anzeigen

Bewertungen

4.6 (200 Bewertungen)
  • 5 stars
    139 ratings
  • 4 stars
    53 ratings
  • 3 stars
    7 ratings
  • 1 star
    1 ratings
JB

Dec 21, 2018

Excellent and informative. Lots of great information about data breaches, how they're discovered andwho was affected.

RR

Feb 08, 2019

Very good course building on the CIA triad and other concepts shared in the previous.

Aus der Unterrichtseinheit
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY
Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

Unterrichtet von

  • Greg Williams

    Greg Williams

    Lecturer

Durchsuchen Sie unseren Katalog

Melden Sie sich kostenlos an und erhalten Sie individuelle Empfehlungen, Aktualisierungen und Angebote.