After the Attack

Loading...
From the course by University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
49 оценки
University of Colorado System
49 оценки
Course 3 of 4 in the Specialization Cybersecurity for Business
From the lesson
Attacks are Inevitable - Case Study
This module will focus on attacks and how detection and response makes the world of difference when responding to an attack.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science

Ознакомьтесь с нашим каталогом

Присоединяйтесь бесплатно и получайте персонализированные рекомендации, обновления и предложения.