Chevron Left
Back to Introduction to Cyber Attacks

Learner Reviews & Feedback for Introduction to Cyber Attacks by New York University

4.7
stars
2,929 ratings

About the Course

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies....

Top reviews

RJ

May 2, 2019

It was fun and challenging. There were few areas were in the quiz where I need to google a few terms which I have not heard before. But other than that it was really fun. Learned a lot.

AC

Feb 25, 2018

Great introduction to cybersecurity concepts with relevant supplemental material in the form of journal papers, magazine articles and supporting TED talks and videos. Highly recommended!

Filter by: