Social Engineering

Loading...
View Syllabus

Reviews

4.6 (181 ratings)
  • 5 stars
    127 ratings
  • 4 stars
    46 ratings
  • 3 stars
    7 ratings
  • 1 star
    1 ratings
JB

Dec 21, 2018

Excellent and informative. Lots of great information about data breaches, how they're discovered andwho was affected.

RR

Feb 08, 2019

Very good course building on the CIA triad and other concepts shared in the previous.

From the lesson
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY
Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

Taught By

  • Greg Williams

    Greg Williams

    Lecturer

Explore our Catalog

Join for free and get personalized recommendations, updates and offers.