University of Colorado System

Cyber Threats and Attack Vectors

Greg Williams

Instructor: Greg Williams

30,629 already enrolled

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
4.7

(659 reviews)

Beginner level
No prior experience required
Flexible schedule
Approx. 11 hours
Learn at your own pace
97%
Most learners liked this course
Gain insight into a topic and learn the fundamentals.
4.7

(659 reviews)

Beginner level
No prior experience required
Flexible schedule
Approx. 11 hours
Learn at your own pace
97%
Most learners liked this course

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

8 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Cybersecurity for Business Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 5 modules in this course

Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

What's included

5 videos4 readings2 assignments1 discussion prompt

Threats against networks and systems are the most common type of attack method. This week will explore these concepts.

What's included

3 videos4 readings2 assignments1 discussion prompt

You use the cloud every day; you may not even realize it! This week will focus on the cloud and security surrounding cloud and cloud services.

What's included

4 videos3 readings2 assignments1 discussion prompt

The week will focus on common vulnerabilities that systems face and how they work.

What's included

4 videos3 readings2 assignments1 discussion prompt

Data breaches occur daily. Sometimes they are announced right away, other times they are found out months after the compromise. This week will focus on the course project.

What's included

1 video1 peer review

Instructor

Instructor ratings
4.7 (125 ratings)
Greg Williams
University of Colorado System
18 Courses155,388 learners

Offered by

Recommended if you're interested in Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

Showing 3 of 659

4.7

659 reviews

  • 5 stars

    75.26%

  • 4 stars

    20.18%

  • 3 stars

    3.03%

  • 2 stars

    0.30%

  • 1 star

    1.21%

BC
4

Reviewed on Mar 26, 2018

VM
5

Reviewed on May 17, 2020

SR
5

Reviewed on Sep 15, 2020

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions