Cyber Threats

Sort options

Palo Alto Networks Academy Cybersecurity Foundation (Coursera)

In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity [...]
4
Average: 4 ( 3 votes )

Real-Time Cyber Threat Detection and Mitigation (Coursera)

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used [...]
0
No votes yet

Introduction to Cyber Attacks (Coursera)

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks [...]
7
Average: 7 ( 3 votes )

Detecting and Mitigating Cyber Threats and Attacks (Coursera)

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the [...]
0
No votes yet

Cyber Threats and Attack Vectors (Coursera)

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I [...]
10
Average: 10 ( 3 votes )

Know your Trolls (Totem)

Tools for journalists to help identify their online abusers and the tactics they use. This course on online harassment was developed by the IWMF, digital security experts, journalists, and online education experts who collaborated during workshops and sprints to co-create it.
9
Average: 9 ( 1 vote )

Phishing Attacks (Totem)

Think before you click. Phishing happens to everyone, but most people only become aware of it once they have become a victim of an attack. Protecting yourself from phishing attacks starts with identifying an email or message as an attack before you click on the link or download the [...]
9
Average: 9 ( 1 vote )

Secure Passwords (Totem)

Pa$$word123, really? Follow your guide to good password management. By this point in the evolution of technology, most of us have a fairly large number of online accounts to keep track of, and to keep safe. It seems like we need multiple accounts for everything - email, messaging, social [...]
9
Average: 9 ( 1 vote )