Who is this class for: This course is for everyone who wants to understand how computer attacks are carried out and what to watch out for if you have information that you need to protect. This course is for those individuals that are looking to be able to discuss computer security with their colleagues and superiors and offer suggestions on what to look out for. The project at the end of the course will also allow you to investigate data breaches and be able to determine where attacks came from and how they were carried out. This course will help you identify and classify attack vectors and how to protect yourself, your business, and your systems from attacks.


Created by:  University of Colorado System

  • Greg Williams

    Taught by:  Greg Williams, Lecturer

    Department of Computer Science
Basic Info
LevelBeginner
Language
English
How To PassPass all graded assignments to complete the course.
Syllabus

FAQs
How It Works
Задания курса
Задания курса

Каждый курс — это интерактивный учебник, который содержит видеоматериалы, тесты и проекты.

Помощь сокурсников
Помощь сокурсников

Общайтесь с тысячами других учащихся: обсуждайте идеи, материалы курса и помогайте друг другу осваивать новые понятия.

Сертификаты
Сертификаты

Получите документы о прохождении курсов и поделитесь своим успехом с друзьями, коллегами и работодателями.

Creators
University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Pricing
Приобрести курсПрослушать
Получить доступ к материалам курса

Available

Available

Получить доступ к оцениваемым материалам курса

Available

Not available

Получить итоговую оценку

Available

Not available

Earn a shareable Course Certificate

Available

Not available