Juniata Classifieds>Juniata Online Courses>Introduction to Cyber Attacks

Introduction to Cyber Attacks

About this Course

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.

Created by: New York University


Related Online Courses

The summer of 2020 has brought issues of equity and race to the forefront of society. How do we create tolerant and just climates at work? Changing the culture of an organization is challenging in... more
Roman Architecture is a course for people who love to travel and want to discover the power of architecture to shape politics, society, and culture.Created by: Yale University more
Learn how to identify the enablers and barriers to learning transfer. Use your own experience to categorise the processes and activities involved in learning and transferring that learning into... more
Designing and Building Institutional Antiracist Spaces (D-BIAS) is a course whose mission is to teach tenets of equity, anti-racism, and cultural justice and how to apply these ideas to achieve... more
Microsoft Azure offers a wide range of services to deploy your applications. To keep control of your environment and to make deployments easier, it also offers a wide array of management tools and... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL