Introduction to Cyber Attacks

  • 4.7
Approx. 19 hours to complete

Course Summary

Learn about the basics of cyber attacks and how to protect yourself and your organization in this introductory course.

Key Learning Points

  • Understand the different types of cyber attacks and their impact on individuals and organizations.
  • Learn about the tools and techniques used by attackers and how to defend against them.
  • Discover the importance of cybersecurity and its increasing demand in the job market.

Job Positions & Salaries of people who have taken this course might have

  • Cybersecurity Analyst
    • USA: $76,000 - $146,000
  • Information Security Manager
    • USA: $100,000 - $180,000
  • Chief Information Security Officer (CISO)
    • USA: $150,000 - $300,000

Related Topics for further study


Learning Outcomes

  • Gain a foundational understanding of cyber attacks and their impact on individuals and organizations.
  • Develop skills to identify and defend against common cyber threats.
  • Understand the importance of cybersecurity in today's digital world.

Prerequisites or good to have knowledge before taking this course

  • Basic computer skills
  • No prior knowledge of cybersecurity required

Course Difficulty Level

Beginner

Course Format

  • Self-paced
  • Online

Similar Courses

  • Cybersecurity Fundamentals
  • Introduction to Cybersecurity
  • Cybersecurity and Its Ten Domains

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Mikko Hyppönen

Related Books

Description

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.

Outline

  • Introduction to Cyber Security
  • Introduction: What You Will Learn from This Course on Cyber Security
  • Assignments and Reading
  • Hacking an Old-Fashioned Soda Machine
  • Simple Worm Program
  • Trojan Horse Login Program
  • Malicious Compiler Program
  • Typical Unix Kernel Attack
  • Explaining Interview Series
  • Welcome Lou Manousos (Part 1)
  • Welcome Lou Manousos (Part 2)
  • Required: Smashing the Stack for Fun and Profit,” Aleph One
  • Required: “Reflections on Trusting Trust,” Ken Thompson
  • Video: DEF CON 23
  • Video: Kevin Mitnick | Talks at Google
  • Suggested: Introduction to Cyber Security (Ch. 1-2)
  • Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 1-2)
  • Module 1 Quiz
  • Understanding Basic Security Frameworks
  • Assignments and Reading
  • Purpose of Cyber Security
  • Adversary Types
  • Vulnerability Types
  • Threat Types
  • Matching Quiz
  • Matching Quiz Solution
  • Confidentiality Threat
  • Integrity Threat
  • Availability Threat
  • Fraud Threat
  • Testing for Vultnerabilities
  • Attacks
  • Brute Force vs. Hueristic Attacks
  • Crytanalysis
  • Cryptanalyzing Caesar Cipher
  • Welcome Jose Dominguez
  • Required: “Why Cryptosystems Fail,” Ross Anderson
  • Required: “There Be Dragons,” Steve Bellovin
  • Video: DMARC Whiteboard Session
  • Video: Defcon 26
  • Suggested: Introduction to Cyber Security, (Ch. 3 - 4)
  • Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 3 – 4)
  • Matching Quiz
  • Further Consideration - Fraud
  • Module 2 Quiz
  • Examining Cyber Threats More Closely
  • Assignments and Reading
  • SQL/ Slammer Worm of 2003
  • Nachi Worm of 2003
  • Botnet Design
  • Botnet Arithmetic
  • Welcome Elad Yoran
  • Assets and Infrastructure
  • Calculating Risk
  • Making Security and Cost Decisions Based on Risk
  • Threat Trees and Completeness of Analysis
  • Required: “Hackers Remotely Kill a Jeep on the Highway with Me in It,” Andy Greenberg, Wired Magazine
  • Required: “A Hacker’s Evolution: Austin’s HD Moore Grew Up with Cybersecurity Industry,” 512 Tech
  • Suggested: Introduction to Cyber Security (Ch. 5 - 6)
  • Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), (Ch. 5 - 6)
  • Video: “Top Hacker Shows Us How It’s Done,” Pablos Holman, TEDx Midwest
  • Video: “All Your Devices Can be Hacked,” Avi Rubin, TED Talk
  • Further Consideration - Threat Trees
  • Module 3 Quiz
  • Introducing Security Risk Analysis
  • Assignments and Reading
  • Mapping Assets to Threats
  • Estimating Risk for Threat-Asset Pairs
  • Example Case Study Matrix (Part 1)
  • Example Case Study Matrix (Part 2)
  • Example Case Study Matrix (Part 3)
  • Mapping Assets, Threats, Vulnerabilities, and Attacks
  • Welcome Nasir Memon
  • Required: “A Man-in-the-Middle Attack on UMTS,” Meyer and Wetzel
  • Required: “Are Computer Hacker Break-Ins Ethical?” Eugene Spafford
  • Video: “What’s Wrong With Your Password,” Lorrie Faith Cranor, TED Talk
  • Video: “Fighting Viruses, Defending the Net,” Mikko Hypponen, TED Talk
  • Suggested: Introduction to Cyber Security, (Ch. 7 - 8)
  • Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 7 – 8)
  • Project Description
  • Additional Self-Learning Opportunities
  • Module 4 Quiz
  • Final Quiz - What level of security risk do you estimate for the following threat-asset matrix entries for the ACME Software Company:

Summary of User Reviews

Key Aspect Users Liked About This Course

The course provides a comprehensive overview of cyber attacks and their impact on individuals and businesses.

Pros from User Reviews

  • The course is very informative and engaging.
  • The instructors are knowledgeable and experienced in the field.
  • The course materials are well-structured and easy to follow.
  • The course provides practical examples and case studies to illustrate concepts.
  • The course is suitable for both beginners and professionals in the field.

Cons from User Reviews

  • The course can be quite challenging for beginners with no prior knowledge of the subject.
  • The course could benefit from more hands-on exercises and practical assignments.
  • The course may be too basic for advanced learners in the field.
  • The course may not cover all types of cyber attacks and their mitigation strategies.
  • The course may not provide enough technical details for some learners.
English
Available now
Approx. 19 hours to complete
Dr. Edward G. Amoroso
New York University
Coursera

Instructor

Dr. Edward G. Amoroso

  • 4.7 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses