Authentication based attacks

Loading...
From the course by 科罗拉多大学系统
Cyber Threats and Attack Vectors
63 ratings
科罗拉多大学系统
63 ratings
Course 2 of 4 in the Specialization Cybersecurity for Business
From the lesson
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY
Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science

Explore our Catalog

Join for free and get personalized recommendations, updates and offers.