Chevron Left
Back to Introduction to Cyber Attacks

Introduction to Cyber Attacks, New York University Tandon School of Engineering

4.7
556 ratings
134 reviews

About this Course

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies....

Top reviews

By AA

Feb 26, 2018

Great introduction to cybersecurity concepts with relevant supplemental material in the form of journal papers, magazine articles and supporting TED talks and videos. Highly recommended!

By JE

Mar 02, 2018

I love this instructor. He makes learning a lot more fun , especially when he gives a real world description of the point he's trying to get across. Well done :) Thanks for this course!

Filter by:

132 Reviews

By DEVANSH GARG

Mar 19, 2019

It is very useful course for learing about cyber security and attaks

By sasank

Mar 18, 2019

Excellent Course

By Shibayan Mondal

Mar 17, 2019

This is really helpful to know the basics of Cyber Attacks

By Yolbary Pereira

Mar 14, 2019

Amazing...

By Ricardo Figueiredo

Mar 12, 2019

Keeps it simple while explaining the

By Leonard Audibert

Mar 10, 2019

I understand that getting the big picture of threat/asset matrix is important, and yet I think it should be mixed in with some more interesting areas of cybersecurity. Maybe mixing the second course with the first would make it more interesting? Anyways, I thought it was tedious, and also boring and very subjective coming to the end of it.

By Salman Daud Essa

Mar 03, 2019

The thing that i liked in this course is the instructor , Very good course.

By Bianca Kwok

Feb 26, 2019

The material covered in this course is interesting. Let down by lack of quality control and amendments on problems with the content (Recommend you check the discussion board for comments about issues with quiz questions before you attempt to answer as you may find that the 'correct' answer is probably one of the ones you discount because there is a wording issue). Questions seem to test your reading skills more than knowledge of the subject (yes, i should read the question properly before selecting an answer but are you testing my literacy or understanding of the subject matter?)

By G SATISH REDDY

Feb 25, 2019

good

By Jithu Geevargheese Panicker

Feb 24, 2019

Very Interesting!

Enjoyed the approach taken by the instructor