Introduction

video-placeholder
Loading...
Просмотреть программу курса

Рецензии

4.7 (оценок: 611)

  • 5 stars
    74,95 %
  • 4 stars
    20,45 %
  • 3 stars
    3,10 %
  • 2 stars
    0,32 %
  • 1 star
    1,14 %

YS

23 сент. 2020 г.

Filled StarFilled StarFilled StarFilled StarFilled Star

Excellent course! I loved it! The instructor is really good and it shows up what the needs of the industry are. He follows every theory point with a real-life example. Excellent course.

YA

8 окт. 2020 г.

Filled StarFilled StarFilled StarFilled StarFilled Star

Greg's explanation is lucid and he incorporates all his IT, CS experience in this course. Very well made and probably some of the best peer community I have ever come across. Cheers!

Из урока

THREATS AND ATTACK VECTORS IN COMPUTER SECURITY

Welcome! This week we'll explore users and user based attacks. User based attacks are common because it may be easier to compromise a human rather than a computer.

Преподаватели

  • Placeholder

    Greg Williams

    Lecturer

Ознакомьтесь с нашим каталогом

Присоединяйтесь бесплатно и получайте персонализированные рекомендации, обновления и предложения.