Introduction to Cyber Attacks
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.
None
Syllabus
Syllabus - What you will learn from this course
Week 1
Introduction to Cyber Security
Week 2
Understanding Basic Security Frameworks
Week 3
Examining Cyber Threats More Closely
Week 4
Introducing Security Risk Analysis
FAQ
When will I have access to the lectures and assignments?
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Reviews
Ed is a very engaging instructor and tries to make the content applicable and understandable. I would recommend this course for anyone who is looking for an introduction to the world of cybersecurity!
its a awesome course.it fills us with knowledge and also spread awareness about different types of cyber attacks and how to prevent ourselves. it also adds my skills list to my resume.
Good introduction for someone that are new to cyber security to look fundamental aspect of cyber security itself which provide high level understanding rather than dive into technical details.
This is a very enlightening course outlining various types of cyber attacks and also showing the approach security experts could take to prevent and mitigate the harmful effects of these attacks.