Cyber Threats

Sort options

Cybersecurity Foundations for Risk Management (Coursera)

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
0
No votes yet

Real-Time Cyber Threat Detection and Mitigation (Coursera)

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used [...]
0
No votes yet

Introduction to Cyber Attacks (Coursera)

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks [...]
7
Average: 7 ( 3 votes )

Detecting and Mitigating Cyber Threats and Attacks (Coursera)

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the [...]
0
No votes yet

Cyber Threats and Attack Vectors (Coursera)

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I [...]
10
Average: 10 ( 3 votes )

Manage the cyber threat for finance professionals (edX)

Self Paced
Manage the cyber threat for finance professionals (edX)
Course Auditing
Categories
Effort
Languages
In this course, we use scenarios/examples to examine the threat of a cyber-attack and good practices on mitigating the risk. This course is designed for accountancy, finance and business professionals working in all organisations from small business, large corporates or financial services or who are just interested in learning [...]
0
No votes yet

Palo Alto Networks Academy Cybersecurity Foundation (Coursera)

In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity [...]
4
Average: 4 ( 3 votes )

Cyberthreats by Malware (openHPI)

In this course we will discuss a huge problem on the Internet: The spread of malware. The number of cyber attacks has increased again in 2020. New forms of malware have evolved, even more disruptive and more damaging. We will cover different types of malware, such as, viruses, worms, [...]
0
No votes yet

Know your Trolls (Totem)

Tools for journalists to help identify their online abusers and the tactics they use. This course on online harassment was developed by the IWMF, digital security experts, journalists, and online education experts who collaborated during workshops and sprints to co-create it.
9
Average: 9 ( 1 vote )

Phishing Attacks (Totem)

Think before you click. Phishing happens to everyone, but most people only become aware of it once they have become a victim of an attack. Protecting yourself from phishing attacks starts with identifying an email or message as an attack before you click on the link or download the [...]
9
Average: 9 ( 1 vote )