Save for later

Detecting and Mitigating Cyber Threats and Attacks

Cybersecurity for Business,

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach.

Get Details and Enroll Now

OpenCourser is an affiliate partner of Coursera and may earn a commission when you buy through our links.

Get a Reminder

Send to:
Rating 4.7 based on 30 ratings
Length 6 weeks
Starts Jun 26 (44 weeks ago)
Cost $79
From University of Colorado System via Coursera
Instructor Greg Williams
Download Videos On all desktop and mobile devices
Language English
Subjects Programming Business IT & Networking
Tags Computer Science Business Business Strategy Computer Security And Networks Security Information Technology

Get a Reminder

Send to:

Similar Courses

What people are saying

los contenidos son los

Los contenidos son los que esperaba.

buenos materiales y bastante

Buen curso, buenos materiales y bastante recomendable.

copy paste answers.the submission

Student ratings detract the grade because some feedback were just copy paste answers.The submission of the papers was confusing.

gained substantial knowledge by

I gained substantial knowledge by taking this course on detecting and mitigating Cyber threats and attacks.

maintain your subscription longer

It could move a little faster for my tastes as there seems to be some drawing out of information a bit to ensure you maintain your subscription longer but the content is good and the instruction clear.

computer or mobile users

I think every computer or mobile users have to complete this course.

es muy claro

Good Es muy claro el profesor.

student ratings detract

at explaining things

Very good course and teacher is very good at explaining things.

claro el profesor

concrete math examples

Lots of concrete math examples which make it easier to understand.

feel like ovrerall

Relevant skills for todays cyber landscape i learn alot onloine without going to collage or university Like the others in this series, I feel like ovrerall they are good.

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile.

Event Specialist and Data Collection Specialist $40k

Data Steward/Analyst $52k

Sn Data Analyst $75k

LAN/WAN Data Analyst $84k

Mobile Data Analyst $92k

Analyst, Fixed Income Data Management Consultant $101k

Assistant Research and Data Analyst Consultant $104k

Vice Assistant President Data Scientist Development Program $106k

Deputy Data Management Specialist $127k

Big Data Analytics Platform Architect and Business Intelligence Leader $143k

Data warehouse & BI professional $175k

Data Warehouse Solutions Architect $192k

Write a review

Your opinion matters. Tell us what you think.

Rating 4.7 based on 30 ratings
Length 6 weeks
Starts Jun 26 (44 weeks ago)
Cost $79
From University of Colorado System via Coursera
Instructor Greg Williams
Download Videos On all desktop and mobile devices
Language English
Subjects Programming Business IT & Networking
Tags Computer Science Business Business Strategy Computer Security And Networks Security Information Technology

Similar Courses

Sorted by relevance

Like this course?

Here's what to do next:

  • Save this course for later
  • Get more details from the course provider
  • Enroll in this course
Enroll Now