- Level Foundation
- Duration 19 hours
- Course by New York University
-
Offered by
About
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.Modules
Module 1
10
Videos
- Introduction: What You Will Learn from This Course on Cyber Security
- Assignments and Reading
- Hacking an Old-Fashioned Soda Machine
- Simple Worm Program
- Trojan Horse Login Program
- Malicious Compiler Program
- Typical Unix Kernel Attack
- Explaining Interview Series
- Welcome Lou Manousos (Part 1)
- Welcome Lou Manousos (Part 2)
Module 1 Assignments
1
Assignment
- Module 1 Quiz
6
Readings
- Required: Smashing the Stack for Fun and Profit,” Aleph One
- Required: “Reflections on Trusting Trust,” Ken Thompson
- Video: DEF CON 23
- Video: Kevin Mitnick | Talks at Google
- Suggested: Introduction to Cyber Security (Ch. 1-2)
- Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 1-2)
Module 2
2
Assignment
- Matching Quiz
- Further Consideration - Fraud
17
Videos
- Assignments and Reading
- Purpose of Cyber Security
- Adversary Types
- Vulnerability Types
- Threat Types
- Matching Quiz
- Matching Quiz Solution
- Confidentiality Threat
- Integrity Threat
- Availability Threat
- Fraud Threat
- Testing for Vultnerabilities
- Attacks
- Brute Force vs. Hueristic Attacks
- Crytanalysis
- Cryptanalyzing Caesar Cipher
- Welcome Jose Dominguez
Module 2 Assignments
1
Assignment
- Module 2 Quiz
6
Readings
- Required: “Why Cryptosystems Fail,” Ross Anderson
- Required: “There Be Dragons,” Steve Bellovin
- Video: DMARC Whiteboard Session
- Video: Defcon 26
- Suggested: Introduction to Cyber Security, (Ch. 3 - 4)
- Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 3 – 4)
Module 3
1
Assignment
- Further Consideration - Threat Trees
10
Videos
- Assignments and Reading
- SQL/ Slammer Worm of 2003
- Nachi Worm of 2003
- Botnet Design
- Botnet Arithmetic
- Welcome Elad Yoran
- Assets and Infrastructure
- Calculating Risk
- Making Security and Cost Decisions Based on Risk
- Threat Trees and Completeness of Analysis
Module 3 Assignments
1
Assignment
- Module 3 Quiz
6
Readings
- Required: “Hackers Remotely Kill a Jeep on the Highway with Me in It,” Andy Greenberg, Wired Magazine
- Required: “A Hacker’s Evolution: Austin’s HD Moore Grew Up with Cybersecurity Industry,” 512 Tech
- Suggested: Introduction to Cyber Security (Ch. 5 - 6)
- Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), (Ch. 5 - 6)
- Video: “Top Hacker Shows Us How It’s Done,” Pablos Holman, TEDx Midwest
- Video: “All Your Devices Can be Hacked,” Avi Rubin, TED Talk
Module 4
8
Videos
- Assignments and Reading
- Mapping Assets to Threats
- Estimating Risk for Threat-Asset Pairs
- Example Case Study Matrix (Part 1)
- Example Case Study Matrix (Part 2)
- Example Case Study Matrix (Part 3)
- Mapping Assets, Threats, Vulnerabilities, and Attacks
- Welcome Nasir Memon
Module 4 Assignments
1
Assignment
- Module 4 Quiz
6
Readings
- Required: “A Man-in-the-Middle Attack on UMTS,” Meyer and Wetzel
- Required: “Are Computer Hacker Break-Ins Ethical?” Eugene Spafford
- Video: “What’s Wrong With Your Password,” Lorrie Faith Cranor, TED Talk
- Video: “Fighting Viruses, Defending the Net,” Mikko Hypponen, TED Talk
- Suggested: Introduction to Cyber Security, (Ch. 7 - 8)
- Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 7 – 8)
Final Project
1
Assignment
- Final Quiz - What level of security risk do you estimate for the following threat-asset matrix entries for the ACME Software Company:
2
Readings
- Project Description
- Additional Self-Learning Opportunities
Auto Summary
"Introduction to Cyber Attacks" is a foundational IT & Computer Science course by Coursera, focusing on common cyber security threats, vulnerabilities, and risks. It covers basic cyber attack construction, including Unix kernel hacks, Internet worms, and DDOS attacks, using real-world examples. Learners will explore the CIA security threat framework and basic cyber security risk analysis. The course is 1140 minutes long, with Starter, Professional, and Paid subscription options, ideal for those seeking a comprehensive understanding of cyber security.

Dr. Edward G. Amoroso