Chevron Left
Back to Cyber Threats and Attack Vectors

Cyber Threats and Attack Vectors, University of Colorado System

4.6
124 ratings
29 reviews

About this Course

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bearer of bad news, but threats are all over the place! This course isn’t designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you on how attacks are carried out so that you have a better sense of what to look out for in your business or with your systems....

Top reviews

By VV

Apr 05, 2018

Great Intro and Follow-Up to First class, will be taking other Cyber-Security Classes to supplement this one and reinforce knowledge.

By RJ

Mar 14, 2018

Nice and easy course...but last week depends on how many people are currently pursuing this course so it may take some time.

Filter by:

28 Reviews

By DEEPAK UPADHYAY

Nov 17, 2018

good course

By Merzyan Bhamgara

Nov 15, 2018

The course is highly recommended for people who wants to have a career in Cyber Security.

Greg is an encyclopedia and has wealth of knowledge on the subject matter.

By Shubin Evgenii Andreevich

Nov 08, 2018

Thats nice.

By Jane

Nov 05, 2018

Great content!

By BERNARD THIANA

Oct 07, 2018

This course and all that comes with it has given me the knowledge and confident, at least to understand the good and the bad that lurks in the web.

I haven't finished yet ….

By Atichat Panno

Sep 24, 2018

Good

By Matt

Sep 23, 2018

This is a great course the data breach assignment at the end was very interesting. It lead me to searching for more information on the internet about how a breach was discovered. I have always been interested in that aspect of the events.

By Regina Angela Molines

Aug 09, 2018

GOOD INTRODUCTION ON CYBERSECURITY

By juan pablo rosato

Jul 30, 2018

Excelente curso. Muy clara la explicacion.

By Aaron

Jul 11, 2018

Excellent content.