This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.
About this Course
Skills you will gain
- 5 stars74.91%
- 4 stars19.55%
- 3 stars3.62%
- 2 stars1.07%
- 1 star0.83%
TOP REVIEWS FROM INTRODUCTION TO CYBER ATTACKS
The course is so much interesting, well-organized and very attractive tha is why I finish it within short period of time. And the teacher is very nice guy and I appreciate him a lot.
Ed is a very engaging instructor and tries to make the content applicable and understandable. I would recommend this course for anyone who is looking for an introduction to the world of cybersecurity!
I love this instructor. He makes learning a lot more fun , especially when he gives a real world description of the point he's trying to get across. Well done :) Thanks for this course!
There's an issue with the final quiz. The directions indicate a figure to be referenced, but the figure is not available. How can the quiz be properly completed without the figure?
About the Introduction to Cyber Security Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.