Classbaze

Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Introduction to Cyber Attacks

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber atta...
4.7
4.7/5
(1,913 reviews)
44,950 students
Created by

8.9

Classbaze Grade®

N/A

Freshness

8.7

Popularity

8.7

Material

Introduction to Cyber Attacks
Platform: Coursera
Video: 4h 34m
Language: English

Best Computer Security and Networks classes:

Classbaze Rating

Classbaze Grade®

8.9 / 10

CourseMarks Score® helps students to find the best classes. We aggregate 18 factors, including freshness, student feedback and content diversity.

Freshness

Course content can become outdated quite quickly. After analysing 71,530 courses, we found that the highest rated courses are updated every year. If a course has not been updated for more than 2 years, you should carefully evaluate the course before enrolling.

Popularity

8.7 / 10
We analyzed factors such as the rating (4.7/5) and the ratio between the number of reviews and the number of students, which is a great signal of student commitment.

New courses are hard to evaluate because there are no or just a few student ratings, but Student Feedback Score helps you find great courses even with fewer reviews.

Material

8.7 / 10
Video Score: 8.3 / 10
The course includes 4h 34m video content. Courses with more videos usually have a higher average rating. We have found that the sweet spot is 16 hours of video, which is long enough to teach a topic comprehensively, but not overwhelming. Courses over 16 hours of video gets the maximum score.
The average video length is 4 hours 22 minutes of 81 Computer Security and Networks courses on Coursera.
Detail Score: 8.0 / 10

The top online course contains a detailed description of the course, what you will learn and also a detailed description about the instructor.

Extra Content Score: 9.8 / 10

Tests, exercises, articles and other resources help students to better understand and deepen their understanding of the topic.

This course contains:

26 articles.
0 resource.
0 exercise.
8 tests or quizzes.

In this page

About the course

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.

Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.

What can you learn from this course?

What you need to start the course?

There is no prerequisite, anyone can begin this course.. This course is also great for beginners without any Computer Security and Networks knowledge.

Who is this course is made for?

This course is suitable for beginners.

Are there coupons or discounts for Introduction to Cyber Attacks ? What is the current price?

Access to most course materials is FREE in audit mode on Coursera. If you wish to earn a certificate and access graded assignments, you must purchase the certificate experience during or after your audit.

If the course does not offer the audit option, you can still take a free 7-day trial.

Will I be refunded if I'm not satisfied with the Introduction to Cyber Attacks course?

Coursera offers a 7-day free trial for subscribers.

Are there any financial aid for this course?

YES, you can get a scholarship or Financial Aid for Coursera courses. The first step is to fill out an application about your educational background, career goals, and financial circumstances. Learn more about financial aid on Coursera.

Who will teach this course? Can I trust Dr. Edward G. Amoroso?

Dr. Edward G. Amoroso has created 4 courses that got 361 reviews which are generally positive. Dr. Edward G. Amoroso has taught 52,102 students and received a 4.79 average review out of 361 reviews. Depending on the information available, we think that Dr. Edward G. Amoroso is an instructor that you can trust.
Computer Science
New York University
Dr. Edward G. Amoroso is Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training, consulting, and media services company supporting hundreds of major organizations across the world. Ed recently retired from AT&T after thirty-one years of service, beginning in Unix security R&D at Bell Labs and culminating as Senior Vice President and Chief Security Officer of AT&T from 2004 to 2016. He was elected an AT&T Fellow in 2010. Ed is Research Professor in the Computer Science Department at the NYU Tandon School of Engineering, and a Senior Advisor at the Applied Physics Laboratory at Johns Hopkins University. He is author of six books on cyber security, and dozens of major research and technical papers in peer-reviewed journals and conference proceedings. Ed has also been Adjunct Professor of Computer Science at the Stevens Institute of Technology for the past twenty-nine years, where he has introduced over three thousand graduate students to the topic of information security. Ed holds the BS degree in Physics from Dickinson College, the MS/PhD degrees in Computer Science from the Stevens Institute of Technology, and is a graduate of the Columbia Business School. He holds ten patents in cyber security technology, and he served previously on the Board of Directors for M&T Bank and the NSA Advisory Board. Ed’s work has been highlighted on CNN, the New York Times, and the Wall Street Journal. He has worked directly with four Presidential administrations on issues related to national security, critical infrastructure protection, and cyber policy. He and his wife Lee live in New Jersey and are the proud parents of three wonderfully successful Millennials.

8.9

Classbaze Grade®

N/A

Freshness

8.7

Popularity

8.7

Material

Platform: Coursera
Video: 4h 34m
Language: English

Classbaze recommendations for you