About this Course

50,403 recent views

Learner Career Outcomes

38%

started a new career after completing these courses

33%

got a tangible career benefit from this course

11%

got a pay increase or promotion
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 12 hours to complete
English

Learner Career Outcomes

38%

started a new career after completing these courses

33%

got a tangible career benefit from this course

11%

got a pay increase or promotion
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 12 hours to complete
English

Offered by

Placeholder

University of Colorado System

Syllabus - What you will learn from this course

Content RatingThumbs Up97%(2,263 ratings)Info
Week
1

Week 1

3 hours to complete

THREATS AND ATTACK VECTORS IN COMPUTER SECURITY

3 hours to complete
5 videos (Total 54 min), 3 readings, 2 quizzes
5 videos
About the Instructor9m
Phishing7m
Social Engineering13m
Authentication based attacks13m
3 readings
About this course10m
Digital Identity - Required Reading30m
Lecture Slides10m
2 practice exercises
Practice Quiz - Week 130m
Week 1 - User based attacks30m
Week
2

Week 2

3 hours to complete

Network and system based attacks

3 hours to complete
3 videos (Total 33 min), 4 readings, 2 quizzes
3 videos
Denial of Service attacks9m
Wireless based attacks10m
4 readings
Viruses and Worms10m
DDoS Attacks15m
Mobile Based Attacks16m
Lecture Slides10m
2 practice exercises
Practice Quiz - Week 230m
Week 2 - Network and system based attacks30m
Week
3

Week 3

3 hours to complete

Cloud Security

3 hours to complete
4 videos (Total 50 min), 3 readings, 2 quizzes
4 videos
Why do we need to be concerned with “The Cloud”15m
SaaS11m
Database Security11m
3 readings
Real Cloud Based Attacks15m
Cloud Security Alliance10m
Lecture Slides10m
2 practice exercises
Practice Quiz - Week 330m
Week 3: Cloud Security30m
Week
4

Week 4

3 hours to complete

Common Vulnerabilities

3 hours to complete
4 videos (Total 38 min), 3 readings, 2 quizzes
4 videos
Operating Systems10m
Software: Buffer Overflows9m
Software: Web Based Applications9m
3 readings
Software: Injection20m
Shadow Brokers15m
Lecture Slides10m
2 practice exercises
Practice Quiz - Week 430m
Week 4: Common Vulnerabilities30m

Reviews

TOP REVIEWS FROM CYBER THREATS AND ATTACK VECTORS

View all reviews

About the Cybersecurity for Business Specialization

Cybersecurity for Business

Frequently Asked Questions

More questions? Visit the Learner Help Center.