Introduction to Cyber Attacks

About this Course

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.

Created by: New York University


Related Online Courses

The Juniper Networks Security Fundamentals specialization provides students a brief overview of cybersecurity problems and how Juniper Networks approaches a complete security solution with Juniper... more
After this course you will be an Earth Economist that can provide evidence-based advise on the best global policy. As an Earth Economist you will better understand the behavior and advice of... more
The learning experience will provide participants with an understanding of psychological safety and the skills needed to create safe, inclusive, and supportive environments in their lives. At the... more
Create your own Marketing Plan for your own product or service idea. In this course you will learn how to produce arguably the most important marketing tool for any business. Rather than simply... more
Welcome to the Lightning App Builder course! The course is designed to empower Salesforce developers and administrators with the skills and knowledge necessary to leverage the power of Lightning... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL