Introduction to Cyber Attacks

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Introduction to Cyber Attacks

Coursera · Beginner ·🏗️ Systems Design & Architecture ·1mo ago
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

I Thought Domain-Driven Design Was a Waste of Time. I Was Wrong.
Learn how Domain-Driven Design can improve software development and why it's essential for backend engineers to understand its value
Dev.to · Mostafijur Rahman
Why Next.js Dominates Modern Web Development
Learn why Next.js dominates modern web development and how it enables faster, scalable websites and applications
Medium · UX Design
We discovered the real workflow during lunch conversations.
Discover the difference between official and real workflows in an organization and learn to identify them
Dev.to · Vishal Koriya
Designing a System to Survive Its Own Success: Lessons from the Treasure Hunt Engine's Scaling Fiasco
Learn how to design a system that can scale to meet sudden surges in demand, avoiding the pitfalls of the Treasure Hunt Engine's scaling fiasco
Dev.to · mary moloyi
Up next
Databases, Scalability and Containers on AWS
Coursera
Watch →