Cyber Threats and Attack Vectors



Cyber Threats and Attack Vectors

Cyber Threats and Attack Vectors


Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s …

Duration Course 2 of 4 in the
Start your Free Trial

Self paced

28,412 already enrolled

4.7stars Rating out of 5 (632 ratings in Coursera)

Go to the Course
We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.