This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.
- 5 stars74.84%
- 4 stars19.72%
- 3 stars3.63%
- 2 stars0.93%
- 1 star0.85%
來自INTRODUCTION TO CYBER ATTACKS的熱門評論
its a awesome course.it fills us with knowledge and also spread awareness about different types of cyber attacks and how to prevent ourselves. it also adds my skills list to my resume.
The Instructor was Incredibly knowledgable, and the videos were excellent. I was able to understand what he was talking about given my very little knowledge of cyber security prior to this course.
The course is exceptionally well structured and taught. Ed sir is such a good teacher who made learning fun. I am looking forward to the next course in this Specialisation. Thank you !
The course is so much interesting, well-organized and very attractive tha is why I finish it within short period of time. And the teacher is very nice guy and I appreciate him a lot.