Introduction to Cyber Attacks
About this Course
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.Created by: New York University

Related Online Courses
Our premium communication course on Communicating with Presence designed by some of the most experienced professionals and academics in the media sector, can help learners improve their soft skills... more
As a follow-on course to \"Kalman Filter Boot Camp\", this course derives the steps of the linear Kalman filter to give understanding regarding how to adjust the method to applications that violate... more
This course aims to provide a general understanding of semiconductor devices. This coures covers the Metal-Semiconductor Contact, Metal-Oxide-Semiconductor (MOS) capapcitor,... more
If you want to help your patients or clients manage conditions or symptoms such as pain and anxiety, this specialization will provide the knowledge and skills needed. In these five courses, you... more
In this 1.5-hour long project, you will be self-publishing a paperback book on Amazon Kindle Direct Publishing. You will be guided through the entire process of selecting a trim size, downloading a... more