Check the free online course on Cyber Attack Vectors and learn about your vulnerable spots and how you could be attacked by a cyber-criminal.
Many people use the internet on a daily basis and many devices are constantly connected to the internet. This is practical, but also comes with a certain vulnerability: A cyber-attack can cause damage with countless consequences. A large number of attack vectors – paths or means to infect a system or network device – pose a risk to anyone using these devices. The goal of this course is to introduce some of the most common and important attack vectors used by cyber attackers. This course provides descriptions of techniques, discusses ramifications, and presents general practices on how to avoid falling victim to the use of the different attack vectors. During the course Cyber Attack Vectors, you will explore Remote Attack Vectors, Malicious Uses of Remote Code Execution, Local Attack Vectors as well as Physical Attack Vectors.