Attacks

Sort options

Exploiting and Securing Vulnerabilities in Java Applications (Coursera)

In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even [...]

Introduction to Cyber Attacks (Coursera)

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks [...]

Hacking and Patching (Coursera)

In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future [...]

Introduction to Cybersecurity for Business (Coursera)

The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. [...]

Understanding 9/11: Why 9/11 Happened & How Terrorism Affects Our World Today (Coursera)

This course will explore the forces that led to the 9/11 attacks and the policies the United States adopted in response. We will examine the phenomenon of modern terrorism, the development of the al Qai'da ideology, and the process by which individuals radicalize towards violence.

Cryptography I (Coursera)

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key [...]

Cybersecurity Basics (edX)

Self Paced
Cybersecurity Basics (edX)
Course Auditing
Categories
Effort
Languages
This course gives you the background needed to understand the basics of Cybersecurity. You will explore information security from its history to a description of various cybercriminals and cybersecurity threats concluding with the tools needed to prevent an attack.

Digital Identities (openHPI)

The average Internet user has more than 25 Internet accounts, which are created for a wide variety of purposes. Besides accounts for e-mail services or social networks, users need access to learning platforms or online shopping services. Each of these internet accounts represents an individual digital identity. Each of [...]