How data breaches are exposed

Loading...
From the course by University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
42 оценки
University of Colorado System
42 оценки
Course 3 of 4 in the Specialization Cybersecurity for Business
From the lesson
Understanding detection and mitigation
This module is the course project. You will review data breaches and understand how they were detected and mitigated.

Meet the Instructors

  • Greg Williams
    Greg Williams
    Lecturer
    Department of Computer Science

Ознакомьтесь с нашим каталогом

Присоединяйтесь бесплатно и получайте персонализированные рекомендации, обновления и предложения.