Chevron Left
Back to Detecting and Mitigating Cyber Threats and Attacks

Detecting and Mitigating Cyber Threats and Attacks, University of Colorado System

4.7
111 ratings
20 reviews

About this Course

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach....

Top reviews

By JJ

Nov 05, 2017

Class doesn't seem very active-- not a lot of students so I had to wait awhile for peer reviewed assignments to get reviewed, but the content is great.

By SH

Jan 08, 2019

Best course to take. Thank you for helping me to improve my understanding about the Cyber Security

Filter by:

20 Reviews

By Sreenivasulu S

Feb 19, 2019

Very Good source for learning on mitigating cyber attacks!

By Diego Macêdo

Jan 16, 2019

Great overview about the cybersecurity threats and some kind of attacks.

By SYED SIBT E HASSAN

Jan 08, 2019

Best course to take. Thank you for helping me to improve my understanding about the Cyber Security

By Jeff Brothis

Dec 31, 2018

Peer-reviewed assignment was identical to a previous course.

By David Manuel Rojas Rosales

Dec 26, 2018

Buen curso, buenos materiales y bastante recomendable.

By shehroz jehangir

Dec 19, 2018

Very good course and teacher is very good at explaining things. Learned alot from this course.

By Osama Bin Fazil

Nov 12, 2018

EXCELLENT COURSE

By Jane

Nov 05, 2018

Fantastic overview and lots of applicable tools and detailed information.

By Karina Narduzzi

Oct 29, 2018

Great course on cyber threats in small business.

By Atichat Panno

Sep 24, 2018

Good