Introduction

Loading...
查看授课大纲

审阅

4.6(181 个评分)
  • 5 stars
    127 ratings
  • 4 stars
    46 ratings
  • 3 stars
    7 ratings
  • 1 star
    1 ratings
JB

Dec 21, 2018

Excellent and informative. Lots of great information about data breaches, how they're discovered andwho was affected.

RR

Feb 08, 2019

Very good course building on the CIA triad and other concepts shared in the previous.

从本节课中
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY
Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

教学方

  • Greg Williams

    Greg Williams

    Lecturer

探索我们的目录

免费加入并获得个性化推荐、更新和优惠。