Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bearer of bad news, but threats are all over the place! This course isn’t designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you on how attacks are carried out so that you have a better sense of what to look out for in your business or with your systems.
- 5 stars
- 4 stars
- 3 stars
- 1 star
來自CYBER THREATS AND ATTACK VECTORS的熱門評論
This course and all that comes with it has given me the knowledge and confident, at least to understand the good and the bad that lurks in the web.\n\nI haven't finished yet ….
The course is highly recommended for people who wants to have a career in Cyber Security.\n\nGreg is an encyclopedia and has wealth of knowledge on the subject matter.
Enjoyed the course. The more of these I take the better they seem to get. Could move a little faster. These are significantly better than the NYU offering.
Great Intro and Follow-Up to First class, will be taking other Cyber-Security Classes to supplement this one and reinforce knowledge.
Nice and easy course...but last week depends on how many people are currently pursuing this course so it may take some time.
Excellent and informative. Lots of great information about data breaches, how they're discovered andwho was affected.
In depth look at Cyber Threats and Attack Vectors from a Business perspective. Great course. No experience required!
Good approach. I still do not know about the subject to be sure if it is the best approach.
Very good course building on the CIA triad and other concepts shared in the previous.
Great course! Of great help for the practice of detecting security breaches.
Excellent Course! which is helped in briefing on Attack Vectors.
Learned a lot new things, But expected more practical sessions.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
關於 Cybersecurity for Business 專項課程