As a society, we are now almost always connected to the internet and rely on it for many different day-to-day activities.
April 1, 2023
English
English [CC]
Description
However, this dependency on the internet can make us vulnerable to attacks.
Once a connected device is compromised, it is not only that particular device that is affected – it can also be used as a springboard to attack other devices in the same network and in others.
In this connected world, it is also inevitable that personal information is stored in large-scale government and commercial databases. Unfortunately, breaches of these large-scale databases happen fairly frequently and, when they do, personal information can be leaked which will make you, and millions of others affected, vulnerable to scams and other identity crimes.
This course analyses several cyber security incidents and looks at what lessons can be learned.
Course learning outcomes
After studying this course, you should be able to:
- demonstrate an understanding of the key concepts, issues and technologies associated with cyber-attacks
- analyse cyber security incidents
- describe and discuss some of the technological, social, legal, ethical and personal issues that relate to cyber security incidents.
Course Curriculum
- Learning from major cyber security incidents Unlimited
About the instructor
Instructor Rating
Reviews
Courses
Students
Hours of videos
27 years, 9 months
Units & Quizzes
Unlimited Lifetime access
Access on mobile app
Certificate of Completion
- For teams of 2 or more users
- 27,000+ fresh & in-demand courses
- Learning Engagement tools
- SSO and LMS Integrations