Chevron Left
Back to Cyber Threats and Attack Vectors

Cyber Threats and Attack Vectors, University of Colorado System

4.6
167 ratings
38 reviews

About this Course

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bearer of bad news, but threats are all over the place! This course isn’t designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you on how attacks are carried out so that you have a better sense of what to look out for in your business or with your systems....

Top reviews

By VV

Apr 05, 2018

Great Intro and Follow-Up to First class, will be taking other Cyber-Security Classes to supplement this one and reinforce knowledge.

By RJ

Mar 14, 2018

Nice and easy course...but last week depends on how many people are currently pursuing this course so it may take some time.

Filter by:

37 Reviews

By Adam Morgan

May 24, 2019

Decent content, but I don't like the peer review projects. It takes too much time waiting for someone else to review it. Give me an exam.

By Jafed Encinas

May 14, 2019

Able to concentrate and stay focused for periods of several hours, even when tasks are relatively mundane, and doesn't make mistakes. He has a high boredom threshold. Always assured and confident in demeanour and presentation of ideas without being aggressively over-confident. No absences without valid reason in 6 months. Reaches a decision rapidly after taking account of all likely outcomes and estimating the route most likely to bring success. The decisions almost always turn out to be good ones.

This Course always completes any assignment on time and to a high standard. This Course has outstanding artistic or craft skills, bringing creativity and originality to the task. Aiming for a top job in the organization. He sets very high standards, aware that this will bring attention and promotion. This Course pays great attention to detail. He always presented work properly checked and completely free of error.

By Michael Ajao-olarinoye

Feb 20, 2019

a well explanatory course

By Sreenivasulu S

Feb 17, 2019

Excellent Course! which is helped in briefing on Attack Vectors.

By Richard Reifel

Feb 08, 2019

Very good course building on the CIA triad and other concepts shared in the previous.

By Satish Sha

Feb 05, 2019

Good. Its informative and effective

By Alexei Navolokin

Jan 28, 2019

great intro

By Habib Ullah

Jan 02, 2019

Excellent course to dive in Cyber Security Knowledge.

By Jeff Brothis

Dec 21, 2018

Excellent and informative. Lots of great information about data breaches, how they're discovered andwho was affected.

By DEEPAK UPADHYAY

Nov 17, 2018

good course