Back to Cyber Threats and Attack Vectors
University of Colorado System

Cyber Threats and Attack Vectors

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bearer of bad news, but threats are all over the place! This course isn’t designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you on how attacks are carried out so that you have a better sense of what to look out for in your business or with your systems.

Status: Cybersecurity
Status: Cyber Attacks
BeginnerCourse13 hours

Featured reviews

BC

4.0Reviewed Mar 27, 2018

Enjoyed the course. The more of these I take the better they seem to get. Could move a little faster. These are significantly better than the NYU offering.

NY

4.0Reviewed Apr 15, 2020

I liked it, learned a lot however I do not like the grading by peers aspect and how it constitutes 40% of your grade, I should not have to wait on peers to grade my assignment.

MB

4.0Reviewed Nov 15, 2018

The course is highly recommended for people who wants to have a career in Cyber Security. Greg is an encyclopedia and has wealth of knowledge on the subject matter.

SR

5.0Reviewed Sep 16, 2020

I have learned lots abouts cyber threats through this course and this is a great chance improve our careera.Thank you so much and this is a professional course.

VM

5.0Reviewed May 18, 2020

Mr. Williams is an excellent teacher, I feel that what I learned from him is irreplaceable going forward, great certification! Thanks Mr. Williams!

N

5.0Reviewed May 18, 2020

Really very informative ,I have learnt many new things.as a beginner of this course I would like to thank entire team of this stream..thank you

YA

5.0Reviewed Oct 9, 2020

Greg's explanation is lucid and he incorporates all his IT, CS experience in this course. Very well made and probably some of the best peer community I have ever come across. Cheers!

SH

4.0Reviewed May 27, 2020

Decent content, but I don't like the peer review projects. It takes too much time to wait for someone else to review it. Give me an exam.

BT

4.0Reviewed Oct 7, 2018

This course and all that comes with it has given me the knowledge and confident, at least to understand the good and the bad that lurks in the web.I haven't finished yet ….

SP

5.0Reviewed Jun 27, 2020

It is very good course for the computer science people..One can get idea about Threat, vulnerability..I strongly recommend this course

A

4.0Reviewed Sep 12, 2022

unfrtunaly have to wait the peer's review and grading to pass the course and get the certificate otherwise its a good and easy to understand course the lecturer is very good

JB

5.0Reviewed Dec 21, 2018

Excellent and informative. Lots of great information about data breaches, how they're discovered andwho was affected.

All reviews

Showing: 20 of 174

Paras
5.0
Reviewed Apr 22, 2020
Adam Morgan
3.0
Reviewed May 25, 2019
Shahadat Hossain
4.0
Reviewed May 27, 2020
Reid Cushman
3.0
Reviewed May 7, 2018
Virgil Lee McClain
5.0
Reviewed May 19, 2020
Jainil Kamal Sanghavi
5.0
Reviewed Jun 11, 2020
mohammad khaneghaei
5.0
Reviewed Jun 11, 2020
Harshvardhan Gupta
5.0
Reviewed May 26, 2020
Israel Macedo Breder
5.0
Reviewed Apr 27, 2018
D R
5.0
Reviewed Nov 27, 2017
Vikas Madaan
3.0
Reviewed May 1, 2020
samuel obani
5.0
Reviewed Dec 4, 2022
ILHAM HAJIYEV
5.0
Reviewed Jul 10, 2025
Joseph G Cornwall
5.0
Reviewed Aug 18, 2020
HARISH SRINIVAS S R 2020-2024 CSE
5.0
Reviewed Mar 4, 2021
Rodney Morris
5.0
Reviewed Apr 4, 2021
ANNIE.T.G
5.0
Reviewed Sep 20, 2020
Dorothee Hartmann
5.0
Reviewed Jun 26, 2020
Jafed Encinas Garcia
5.0
Reviewed Jul 6, 2019
Lin Tan
5.0
Reviewed Jan 16, 2018