Who is this class for: This course is for everyone who wants to understand how computer attacks are carried out and what to watch out for if you have information that you need to protect. This course is for those individuals that are looking to be able to discuss computer security with their colleagues and superiors and offer suggestions on what to look out for. The project at the end of the course will also allow you to investigate data breaches and be able to determine where attacks came from and how they were carried out. This course will help you identify and classify attack vectors and how to protect yourself, your business, and your systems from attacks.


Created by:  University of Colorado System

  • Greg Williams

    Taught by:  Greg Williams, Lecturer

    Department of Computer Science
Basic Info
LevelBeginner
Language
English
How To PassPass all graded assignments to complete the course.
Syllabus

FAQs
How It Works
Coursework
Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from Your Peers
Help from Your Peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates
Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

Creators
University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Pricing
Purchase CourseAudit
Access to course materials

Available

Available

Access to graded materials

Available

Not available

Receive a final grade

Available

Not available

Earn a shareable Course Certificate

Available

Not available