Chevron Left
Volver a Introduction to Cyber Attacks

Opiniones y comentarios de aprendices correspondientes a Introduction to Cyber Attacks por parte de New York University

4.7
estrellas
1,464 calificaciones
374 revisiones

Acerca del Curso

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies....

Principales revisiones

HI

Mar 04, 2020

I'm so glad I could complete this course as I look forward to continuing other courses on Cyber attacks. Its been helpful as it gave me the background knowledge as to what is needed in Cyber Security.

PH

Jun 28, 2020

Ed is a very engaging instructor and tries to make the content applicable and understandable. I would recommend this course for anyone who is looking for an introduction to the world of cybersecurity!

Filtrar por:

151 - 175 de 369 revisiones para Introduction to Cyber Attacks

por Julio A C C

May 29, 2020

Good Course , I appreciate for all the knowledge sharing thanks so much

por Alberto P

Apr 20, 2020

I really enjoyed this Course, I may be continuing with the other courses

por david k

Apr 02, 2020

Very good lectures covering what you will experience in the workplace.

por Hemant A

Mar 30, 2020

One of the best courses! I love Edward's style of teaching. Thank you!

por Anant J

Mar 19, 2019

It is very useful course for learing about cyber security and attaks

por Aaron S

Jun 19, 2018

I loved the format and I really felt that I absorbed the knowledge.

por Sjir B

Mar 30, 2018

Great course! Learned allot this teacher shows he enjoys teaching!

por shreya s

Jul 17, 2020

This course really helped me a lot to understand cyber security.

por Christoffer J

Oct 10, 2019

Very good course with good examples and easy to follow lectures

por Dhinakaran R

Jul 21, 2019

Really amazing course to start learning about cyber technology.

por Vasileios K

Jul 28, 2018

Good Systemic overview of Cyber Security with engaging content.

por Keshav K

Apr 24, 2018

The course was excellent and it provided me in depth knowledge.

por Alberto C

May 16, 2020

Muy bueno para quienes queremos iniciarnos en cyber seguridad.

por Nguyễn H T K

May 03, 2020

This course is fantastic. Every concept is explained clearly.

por Jithu G P

Feb 24, 2019

Very Interesting!

Enjoyed the approach taken by the instructor

por Sanie J C

Jun 07, 2019

Lots of info and provided a clear discussion on each module.

por Samuel D V

Aug 10, 2018

This is a very good course!

Congrats and thanks, Ed Amorosa!!

por Pedro O

Jun 28, 2020

Very challenging for a beginners course, glad i passed it.

por Shibayan M

Mar 17, 2019

This is really helpful to know the basics of Cyber Attacks

por William M

Feb 11, 2018

Very informative with interesting take on relative topics.

por Luis M O C

Feb 11, 2018

ED Amoroso great teacher! Nice person, nice to listen to.

por Sudhanshu R

Jun 08, 2020

Nice course, i get the good knowledge from this course.

por G.R.Srinath

Mar 02, 2020

Great Experience in learning cyber security rudiments.

por Jonas B

Jun 28, 2020

Definitely provided a different view on cybersecurity

por Chaitanya T

Mar 27, 2020

Very good Course Good introduction for cyber security