Authentication based attacks

Loading...
From the course by University of Colorado System
Cyber Threats and Attack Vectors
15 ratings
University of Colorado System

Cyber Threats and Attack Vectors

15 ratings
Course 2 of 4 in the Specialization Cybersecurity for Business
From the lesson
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY
Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science
Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online.
© 2017 Coursera Inc. All rights reserved.
Download on the App StoreGet it on Google Play