This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.
New York University
Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship.
- 5 stars
- 4 stars
- 3 stars
- 2 stars
- 1 star
来自INTRODUCTION TO CYBER ATTACKS的热门评论
I'm so glad I could complete this course as I look forward to continuing other courses on Cyber attacks. Its been helpful as it gave me the background knowledge as to what is needed in Cyber Security.
Ed is a very engaging instructor and tries to make the content applicable and understandable. I would recommend this course for anyone who is looking for an introduction to the world of cybersecurity!
Dr.Amoroso was really awesome I previously took a cybersecurity class in my college but never really learned much about the cyber attacks. It is a great class to start your cyber security journey.
This is a very enlightening course outlining various types of cyber attacks and also showing the approach security experts could take to prevent and mitigate the harmful effects of these attacks.
关于 Introduction to Cyber Security 专项课程
Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences.
Is financial aid available?