Introduction

Loading...

검토

4.6(171개의 평가)
  • 5 stars
    117 ratings
  • 4 stars
    46 ratings
  • 3 stars
    7 ratings
  • 1 star
    1 ratings
JB

Dec 21, 2018

Excellent and informative. Lots of great information about data breaches, how they're discovered andwho was affected.

RR

Feb 08, 2019

Very good course building on the CIA triad and other concepts shared in the previous.

수업에서
THREATS AND ATTACK VECTORS IN COMPUTER SECURITY
Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

강사:

  • Greg Williams

    Greg Williams

    Lecturer

Coursera 카탈로그 살펴보기

무료로 참여해 맞춤화된 추천, 업데이트 및 제안을 받아보세요.