This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.
This course is part of the Introduction to Cyber Security Specialization
About this Course
Skills you will gain
- Information Security (INFOSEC)
- Denial-Of-Service Attack (DOS)
- Risk Assessment
Syllabus - What you will learn from this course
Introduction to Cyber Security
Understanding Basic Security Frameworks
Examining Cyber Threats More Closely
Introducing Security Risk Analysis
- 5 stars74.96%
- 4 stars19.55%
- 3 stars3.61%
- 2 stars1.04%
- 1 star0.81%
TOP REVIEWS FROM INTRODUCTION TO CYBER ATTACKS
I'm so glad I could complete this course as I look forward to continuing other courses on Cyber attacks. Its been helpful as it gave me the background knowledge as to what is needed in Cyber Security.
Great introduction to cybersecurity concepts with relevant supplemental material in the form of journal papers, magazine articles and supporting TED talks and videos. Highly recommended!
There's an issue with the final quiz. The directions indicate a figure to be referenced, but the figure is not available. How can the quiz be properly completed without the figure?
The course is exceptionally well structured and taught. Ed sir is such a good teacher who made learning fun. I am looking forward to the next course in this Specialisation. Thank you !
About the Introduction to Cyber Security Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.