Cyber Threats and Attack Vectors
Get a Reminder
Rating | 4.6★ based on 38 ratings |
---|---|
Length | 6 weeks |
Starts | Jun 26 (44 weeks ago) |
Cost | $79 |
From | University of Colorado System via Coursera |
Instructor | Greg Williams |
Download Videos | On all desktop and mobile devices |
Language | English |
Subjects | Programming Business IT & Networking |
Tags | Computer Science Business Business Strategy Computer Security And Networks Security Information Technology |
Get a Reminder
Similar Courses
What people are saying
introduction on cybersecurity
more practical aspects
More practical aspects should be covered Great course!
no experience required
No experience required!
clara la explicacion
Muy clara la explicacion.
concrete math examples
Lots of concrete math examples which make it easier to understand.
finished yet …
This course and all that comes with it has given me the knowledge and confident, at least to understand the good and the bad that lurks in the web.I haven't finished yet ….
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
Event Specialist and Data Collection Specialist $40k
Data Steward/Analyst $52k
Sn Data Analyst $75k
LAN/WAN Data Analyst $84k
Mobile Data Analyst $92k
Analyst, Fixed Income Data Management Consultant $101k
Assistant Research and Data Analyst Consultant $104k
Vice Assistant President Data Scientist Development Program $106k
Deputy Data Management Specialist $127k
Big Data Analytics Platform Architect and Business Intelligence Leader $143k
Data warehouse & BI professional $175k
Data Warehouse Solutions Architect $192k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | 4.6★ based on 38 ratings |
---|---|
Length | 6 weeks |
Starts | Jun 26 (44 weeks ago) |
Cost | $79 |
From | University of Colorado System via Coursera |
Instructor | Greg Williams |
Download Videos | On all desktop and mobile devices |
Language | English |
Subjects | Programming Business IT & Networking |
Tags | Computer Science Business Business Strategy Computer Security And Networks Security Information Technology |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course