- Level Foundation
- Duration 12 hours
- Course by University of Colorado System
-
Offered by
About
Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today's environment. I hate to be the bearer of bad news, but threats are all over the place! This course isn't designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you on how attacks are carried out so that you have a better sense of what to look out for in your business or with your systems.Modules
Introduction
2
Videos
- Introduction
- About the Instructor
2
Readings
- About this course
- Get help and meet other learners. Join your Community!
User Based Attacks
2
Assignment
- Practice Quiz - Week 1
- Week 1 - User based attacks
1
Discussions
- What do you want out of this course?
3
Videos
- Phishing
- Social Engineering
- Authentication based attacks
2
Readings
- Digital Identity - Required Reading
- Lecture Slides
Network and system based attacks
2
Assignment
- Practice Quiz - Week 2
- Week 2 - Network and system based attacks
1
Discussions
- Attacks
3
Videos
- Network based attacks
- Denial of Service attacks
- Wireless based attacks
4
Readings
- Viruses and Worms
- DDoS Attacks
- Mobile Based Attacks
- Lecture Slides
Cloud Security
2
Assignment
- Practice Quiz - Week 3
- Week 3: Cloud Security
1
Discussions
- The Cloud
4
Videos
- What is "The Cloud"?
- Why do we need to be concerned with “The Cloud”
- SaaS
- Database Security
3
Readings
- Real Cloud Based Attacks
- Cloud Security Alliance
- Lecture Slides
Common Vulnerabilities
2
Assignment
- Practice Quiz - Week 4
- Week 4: Common Vulnerabilities
1
Discussions
- Vulnerabilities
4
Videos
- Misconfiguration
- Operating Systems
- Software: Buffer Overflows
- Software: Web Based Applications
3
Readings
- Software: Injection
- Shadow Brokers
- Lecture Slides
Data Breaches Discovery - A Project
1
Peer Review
- How data breaches are found out
1
Videos
- Discovering Data Breaches!
Auto Summary
Enhance your understanding of cyber threats and attack vectors with this foundational course in IT & Computer Science. Guided by an expert instructor, delve into how attackers infiltrate systems, the repercussions of data breaches, and strategies to safeguard your business. This 720-minute course is ideal for beginners and available through Coursera's Starter subscription. Perfect for those looking to bolster their cybersecurity knowledge.

Greg Williams