Introduction to Cyber Attacks
About this Course
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.Created by: New York University

Related Online Courses
This two-module Social Media Marketing program prepares you for entry-level digital marketing and e-commerce roles. You\'ll learn to attract and engage customers through various social channels and... more
Dalam kursus tingkat pemula ini, Anda akan mempelajari alur kerja Analisis Data di Google Cloud dan alat yang dapat Anda gunakan untuk mengeksplorasi, menganalisis, dan memvisualisasikan data,... more
This comprehensive course covers the foundational principles of Continuous Integration (CI) and Continuous Deployment (CD), emphasizing the integral role of automation in the software development... more
This specialization provides an in-depth exploration of renewable energy technologies and their critical role in addressing global challenges. The journey begins with an exploration of climate... more
This specialization is developed for seniors and fresh graduate students to understand fundamental network architecture concepts and their impacts on cyber security, to develop skills and... more