Who is this class for: This course is for everyone who wants to understand how computer attacks are carried out and what to watch out for if you have information that you need to protect. This course is for those individuals that are looking to be able to discuss computer security with their colleagues and superiors and offer suggestions on what to look out for. The project at the end of the course will also allow you to investigate data breaches and be able to determine where attacks came from and how they were carried out. This course will help you identify and classify attack vectors and how to protect yourself, your business, and your systems from attacks.


Created by:  University of Colorado System

  • Greg Williams

    Taught by:  Greg Williams, Lecturer

    Department of Computer Science
Basic Info
LevelBeginner
Language
English
How To PassPass all graded assignments to complete the course.
Syllabus

FAQs
How It Works
课程作业
课程作业

每门课程都像是一本互动的教科书,具有预先录制的视频、测验和项目。

来自同学的帮助
来自同学的帮助

与其他成千上万的学生相联系,对想法进行辩论,讨论课程材料,并寻求帮助来掌握概念。

证书
证书

获得正式认证的作业,并与朋友、同事和雇主分享您的成功。

Creators
University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Pricing
购买课程旁听
访问课程材料

Available

Available

访问评分的材料

Available

Not available

收到最终成绩

Available

Not available

获得可共享的课程证书

Available

Not available