Introduction to Cyber Attacks
About this Course
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.Created by: New York University
Related Online Courses
Leadership for Public Health Crises will enable current and prospective managers, directors, unit heads, and elected officials to effectively lead their organizational response to profound... more
This is the third course in Tax Academy\'s Customs Certification. This certification would provide you with relevant skills to apply Customs knowledge in less than two months. In this course, you... more
This course is best suited for individuals who have a technical background in mathematics/statistics/computer science/engineering pursuing a career change to jobs or industries that are data-driven... more
This course takes you on a comprehensive journey from the basics of 3D modeling in Blender to importing a game-ready medieval windmill into Unreal Engine 5. Starting with a solid foundation in... more
This course provides an in-depth introduction to value investing, a strategy focused on identifying undervalued stocks. Participants will explore key concepts, tools, and techniques necessary for... more