Introduction

Loading...
查看授课大纲

审阅

4.7(554 个评分)
  • 5 stars
    73.64%
  • 4 stars
    21.66%
  • 3 stars
    3.24%
  • 2 stars
    0.36%
  • 1 star
    1.08%
YS
Sep 23, 2020

Excellent course! I loved it! The instructor is really good and it shows up what the needs of the industry are. He follows every theory point with a real-life example. Excellent course.

YA
Oct 8, 2020

Greg's explanation is lucid and he incorporates all his IT, CS experience in this course. Very well made and probably some of the best peer community I have ever come across. Cheers!

从本节课中
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY
Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

教学方

  • Placeholder

    Greg Williams

    Lecturer

探索我们的目录

免费加入并获得个性化推荐、更新和优惠。