Learn how to think like a hacker, but behave as a security expert.
Take this course free on edX: https://www.edx.org/course/cyber-security-basics-hands-approach-uc3mx-inf-2x#!
Are you tired of hearing that your computer has a virus? Or that your email account has been hacked? Now, is the time for you to protect yourself by understanding the basics of cyber security.
This computer science course presents an introduction to cyber security showing different aspects of this discipline. You will learn what the main existing cyber security threats are and how to protect yourself against them. The course presents a practical approach in which all required material will be provided to allow you to better understand attacks and establish appropriate countermeasures.
Taught by instructors with years of experience in the field of computer security, this course will pave the way to the security area of IT-related professions.
WHAT YOU'LL LEARN
Cyber security landscape
Reverse engineering
Managing and monitoring network cyber security attacks
Computer forensics
Malware and advanced persistent threats
Vulnerability management and pentesting
Take this course free on edX: https://www.edx.org/course/cyber-security-basics-hands-approach-uc3mx-inf-2x#!
Are you tired of hearing that your computer has a virus? Or that your email account has been hacked? Now, is the time for you to protect yourself by understanding the basics of cyber security.
This computer science course presents an introduction to cyber security showing different aspects of this discipline. You will learn what the main existing cyber security threats are and how to protect yourself against them. The course presents a practical approach in which all required material will be provided to allow you to better understand attacks and establish appropriate countermeasures.
Taught by instructors with years of experience in the field of computer security, this course will pave the way to the security area of IT-related professions.
WHAT YOU'LL LEARN
Cyber security landscape
Reverse engineering
Managing and monitoring network cyber security attacks
Computer forensics
Malware and advanced persistent threats
Vulnerability management and pentesting
- Category
- Tech Education Channel
Be the first to comment