Chevron Left
返回到 Detecting and Mitigating Cyber Threats and Attacks

学生对 科罗拉多大学系统 提供的 Detecting and Mitigating Cyber Threats and Attacks 的评价和反馈

398 个评分


Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach....



Feb 9, 2021

Concepts were very simplified and concise. Examples given in the course were past incidents the faculty had experienced and it helped me translate the theory into work.


Nov 4, 2017

Class doesn't seem very active-- not a lot of students so I had to wait awhile for peer reviewed assignments to get reviewed, but the content is great.


26 - Detecting and Mitigating Cyber Threats and Attacks 的 50 个评论(共 86 个)

创建者 Diego M

Jan 16, 2019

Great overview about the cybersecurity threats and some kind of attacks.

创建者 Rovshan S

Jul 24, 2019

I think every computer or mobile users have to complete this course.

创建者 Paras

Apr 23, 2020

One word will be enough Awesome..I want more material for reading.

创建者 Essaiyas B

Sep 16, 2021

i​ am very intersting the course tha i hve tsken from the lesson

创建者 Raymond O O

May 11, 2019

The peer assignment is taking alot of time. It needs improvement

创建者 Aaron

Jul 11, 2018

Great content and the instructor's explanations are very clear.

创建者 juan p r

Aug 22, 2018

Es muy claro el profesor. Los contenidos son los que esperaba.

创建者 Jorge G

Sep 21, 2020

Interesting, quality course, with very interesting content.


May 20, 2019

It was a great effort of all great teacher and university

创建者 Muhammad Y

Apr 15, 2018

i learn alot onloine without going to collage or university

创建者 Sreenivasulu S

Feb 18, 2019

Very Good source for learning on mitigating cyber attacks!

创建者 Sebin J

Jun 23, 2021

very good lecture classes.....get new ideas thankz a lot

创建者 David M R R

Dec 26, 2018

Buen curso, buenos materiales y bastante recomendable.

创建者 Eugene N N

Oct 4, 2020

The course is very educative, i learnt a lot from it.

创建者 Tushar A R

May 21, 2020

Detecting and Mitigating Cyber Threats and Attacks

创建者 Ayodélé J F O

Jan 20, 2022

Good course about Threat detection and Mitigation

创建者 Karina N

Oct 29, 2018

Great course on cyber threats in small business.

创建者 Bara' E

Nov 24, 2021

Amazing Course, Thank you Colorado University

创建者 Moses W K

Apr 30, 2018

Relevant skills for todays cyber landscape

创建者 Michel T

Sep 9, 2019

Very informative and instructive course!

创建者 Gizachew T

Apr 7, 2020

Excellent course for security learners.

创建者 Marc R

May 24, 2020

Maybe the best course I have attended.


Apr 29, 2021

Awesome content, just loved it.

创建者 Iqbal U K

Oct 9, 2020

Good Course - Good Teacher!!


May 25, 2020

i really enjoyed the course