• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online DegreeExplore Bachelor’s & Master’s degrees
  • MasterTrack™Earn credit towards a Master’s degree
  • University CertificatesAdvance your career with graduate-level learning
Careers
  • Log In
  • Join for Free
    Coursera
    Chevron Left
    Back to Cyber Threats and Attack Vectors

    Learner Reviews & Feedback for Cyber Threats and Attack Vectors by University of Colorado System

    Filled StarFilled StarFilled StarFilled StarHalf Faded Star
    4.7
    stars
    665 ratings

    About the Course

    Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have
    been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be
    concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of
    threats and attack vectors commonly seen in today’s environment. I hate to be the bearer of bad news, but threats are all over the place! This
    course isn’t designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you o...
    ...

    Top reviews

    RB

    Jul 21, 2020

    Filled StarFilled StarFilled StarFilled StarFilled Star

    I learned a lot in this course thanks to you Greg, you explained all topics very effectively and easy to understandable thanks to many examples you presented .KEEP TEACHING ALL THE BEST TO YOU TOO

    PP

    Apr 21, 2020

    Filled StarFilled StarFilled StarFilled StarFilled Star

    I learned alot from this course. but peers review is something should not be there. one of the peer gave me all 0 without any reason however other two gave me 100 and 80 with sensible reason.

    Filter by:

    126 - 150 of 173 Reviews for Cyber Threats and Attack Vectors

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By TANMAY S

    •

    Jul 24, 2021

    good

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By shalini

    •

    Jul 29, 2020

    good

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By SAYANTAN D

    •

    Jun 7, 2020

    Nice

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By MAHANTHI A

    •

    Jun 2, 2020

    Good

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By KARTIK R

    •

    May 18, 2020

    Nice

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Shivanand S

    •

    Apr 30, 2020

    Good

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Atichat P

    •

    Sep 24, 2018

    Good

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Novelty

    •

    Jan 16, 2018

    good

    Filled StarFilled StarFilled StarFilled StarFilled Star

    By Ankit

    •

    Nov 19, 2024

    ldm

    Filled StarFilled StarFilled StarFilled StarStar

    By Md. M H

    •

    Sep 20, 2020

    Everything they describe very clearly, at first i thought they will learn us something practical, but they discuss about every thing about cyber threats and all classification. Those who are interested to work in Cyber Security they should take this course for learn basic thing.

    Filled StarFilled StarFilled StarFilled StarStar

    By John P

    •

    Mar 17, 2018

    Still a good introductory course with some detailed explanation. I was expecting a bit more practice rather than security concepts, since this course has already been dealing with real-life attacks. But maybe practice comes in the following two courses of this series.

    Filled StarFilled StarFilled StarFilled StarStar

    By Matt P

    •

    Sep 23, 2018

    This is a great course the data breach assignment at the end was very interesting. It lead me to searching for more information on the internet about how a breach was discovered. I have always been interested in that aspect of the events.

    Filled StarFilled StarFilled StarFilled StarStar

    By PAMPOLINI M

    •

    Apr 27, 2022

    Good course, maybe I expected more technical and practical explanations on how to perform the various kinds of attacks, just a negative note on poor feedback during peer graded review.

    Filled StarFilled StarFilled StarFilled StarStar

    By Nicole C Y

    •

    Apr 15, 2020

    I liked it, learned a lot however I do not like the grading by peers aspect and how it constitutes 40% of your grade, I should not have to wait on peers to grade my assignment.

    Filled StarFilled StarFilled StarFilled StarStar

    By Ali A

    •

    Sep 12, 2022

    unfrtunaly have to wait the peer's review and grading to pass the course and get the certificate

    otherwise its a good and easy to understand course the lecturer is very good

    Filled StarFilled StarFilled StarFilled StarStar

    By BERNARD T

    •

    Oct 7, 2018

    This course and all that comes with it has given me the knowledge and confident, at least to understand the good and the bad that lurks in the web.

    I haven't finished yet ….

    Filled StarFilled StarFilled StarFilled StarStar

    By Merzyan B

    •

    Nov 15, 2018

    The course is highly recommended for people who wants to have a career in Cyber Security.

    Greg is an encyclopedia and has wealth of knowledge on the subject matter.

    Filled StarFilled StarFilled StarFilled StarStar

    By Bryan C

    •

    Mar 27, 2018

    Enjoyed the course. The more of these I take the better they seem to get. Could move a little faster. These are significantly better than the NYU offering.

    Filled StarFilled StarFilled StarFilled StarStar

    By David B

    •

    Feb 7, 2018

    In depth look at Cyber Threats and Attack Vectors from a Business perspective. Great course. No experience required!

    Filled StarFilled StarFilled StarFilled StarStar

    By Ярослав В У

    •

    Dec 16, 2021

    Спасибо за курс. Довольно просто и содержательно, также понравилось, что было достаточно дополнительных материалов.

    Filled StarFilled StarFilled StarFilled StarStar

    By Harshit S

    •

    Apr 26, 2020

    Data breaching,phishing,Eavesdropping ,cloud information,security,threats are the very interesting topics.

    Filled StarFilled StarFilled StarFilled StarStar

    By GODFRED A

    •

    Nov 18, 2020

    Thank you very much for your help. I'm much grateful for what you've done for me

    Filled StarFilled StarFilled StarFilled StarStar

    By Pranav G

    •

    Jun 8, 2020

    It was a nice experience,the course was explained very throughly.

    Filled StarFilled StarFilled StarFilled StarStar

    By Unmesha B

    •

    Jul 11, 2020

    good course,informative.can include a bit of practical component

    Filled StarFilled StarFilled StarFilled StarStar

    By MORE A M

    •

    May 7, 2020

    This course has many informative things and more things to learn

    • Chevron Left
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • Chevron Right

    Coursera Footer

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Do Not Sell/Share
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok
    Coursera

    Welcome back

    ​
    Your password is hidden
    ​

    or

    New to Coursera?


    Having trouble logging in? Learner help center

    This site is protected by reCAPTCHA Enterprise and the Google Privacy Policy and Terms of Service apply.