This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.
This course is part of the Introduction to Cyber Security Specialization
About this Course
Skills you will gain
- Information Security (INFOSEC)
- Denial-Of-Service Attack (DOS)
- Risk Assessment
Syllabus - What you will learn from this course
Introduction to Cyber Security
Understanding Basic Security Frameworks
Examining Cyber Threats More Closely
Introducing Security Risk Analysis
- 5 stars74.94%
- 4 stars19.58%
- 3 stars3.60%
- 2 stars1.04%
- 1 star0.81%
TOP REVIEWS FROM INTRODUCTION TO CYBER ATTACKS
Great introduction to cybersecurity concepts with relevant supplemental material in the form of journal papers, magazine articles and supporting TED talks and videos. Highly recommended!
This is very good course for the people who want to learn about cyber attacks/security from the beginning. Wonderful experience and looking forward to grow my knowledge in Cyber Security.
There's an issue with the final quiz. The directions indicate a figure to be referenced, but the figure is not available. How can the quiz be properly completed without the figure?
Great introductory course to cyber security. Learned the basics of cyber security, CIA model of threat assessment and how to classify assets for each of the threats level - High Medium Low.
About the Introduction to Cyber Security Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.