Chevron Left
Back to Detecting and Mitigating Cyber Threats and Attacks

Learner Reviews & Feedback for Detecting and Mitigating Cyber Threats and Attacks by University of Colorado System

4.7
stars
452 ratings

About the Course

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach....

Top reviews

J

Feb 9, 2021

Concepts were very simplified and concise. Examples given in the course were past incidents the faculty had experienced and it helped me translate the theory into work.

JF

Nov 4, 2017

Class doesn't seem very active-- not a lot of students so I had to wait awhile for peer reviewed assignments to get reviewed, but the content is great.

Filter by:

26 - 50 of 95 Reviews for Detecting and Mitigating Cyber Threats and Attacks

By Diego M

•

Jan 16, 2019

Great overview about the cybersecurity threats and some kind of attacks.

By Rovshan S

•

Jul 24, 2019

I think every computer or mobile users have to complete this course.

By Paras

•

Apr 23, 2020

One word will be enough Awesome..I want more material for reading.

By Raymond O O

•

May 11, 2019

The peer assignment is taking alot of time. It needs improvement

By Aaron

•

Jul 11, 2018

Great content and the instructor's explanations are very clear.

By juan p r

•

Aug 22, 2018

Es muy claro el profesor. Los contenidos son los que esperaba.

By Jorge G

•

Sep 21, 2020

Interesting, quality course, with very interesting content.

By MUHAMMAD B

•

May 20, 2019

It was a great effort of all great teacher and university

By muhammad y

•

Apr 15, 2018

i learn alot onloine without going to collage or university

By Eugene N N

•

Oct 4, 2020

The course is very educative, i learnt a lot from it.

By Rane T I

•

May 21, 2020

Detecting and Mitigating Cyber Threats and Attacks

By Ayodélé J F O

•

Jan 20, 2022

Good course about Threat detection and Mitigation

By Karina N

•

Oct 29, 2018

Great course on cyber threats in small business.

By Faisal s o A

•

Jan 7, 2023

i can't move on , the coures has to update

By Moses W K

•

Apr 30, 2018

Relevant skills for todays cyber landscape

By Michel T

•

Sep 9, 2019

Very informative and instructive course!

By Gizachew T

•

Apr 7, 2020

Excellent course for security learners.

By RISHAV K S

•

Apr 29, 2021

Awesome content, just loved it.

By YOKESHWAR Y

•

May 25, 2020

i really enjoyed the course

By Diego G

•

May 6, 2020

I loved this course

By Deepak K

•

Jun 23, 2020

A very good course

By Dinabandhu M

•

May 21, 2020

Very informative.

By Sushama P

•

May 10, 2020

Excellent Content

By Baneet k

•

May 8, 2020

very good course

By Osama B F

•

Nov 12, 2018

EXCELLENT COURSE