AG
Aug 14, 2020
The reading link to Week 03's Framework and their purpose is Broken. Please Fix it. Everything else seemed perfect. I would recommend this course for people who think of starting their careers in CyS.
RV
Dec 24, 2020
If you want to learn cybersecurity and you have no idea about that. Then this is the best course which covers all the basic topics and provide you a best knowledge about cybersecurity and their tools.
By Bunyodbek G
•Apr 25, 2024
m
By Muhammad W R
•Oct 7, 2022
By Abiodun R
•Sep 6, 2022
By Bala K
•Aug 26, 2022
n
By pascal n
•Aug 14, 2022
By Yewande O O F
•Jul 31, 2022
By Aman P
•Jul 23, 2022
o
By Khairatuly S
•Apr 27, 2022
l
By Sai t D
•Apr 25, 2022
g
By Saleh J A
•Mar 16, 2022
,
By Ali F K
•Dec 11, 2021
.
By Chandana K C
•Oct 18, 2021
.
By hanumanth r s
•Apr 18, 2021
.
By Sudhir K R
•Jan 30, 2021
.
By Viraj M
•Jan 21, 2021
E
By Sana S
•Apr 27, 2020
i
By Yudhistir C
•Apr 5, 2020
V
By Alfred E
•Jun 26, 2023
Title: Safeguarding Digital Frontiers: A Review of Cybersecurity Tools and Attacks
Introduction: In the age of pervasive technology and interconnected systems, the importance of cybersecurity cannot be overstated. As the digital landscape continues to evolve, both organizations and individuals face an escalating threat from cyber attacks. To combat these dangers, a multitude of cybersecurity tools have emerged, designed to fortify our digital frontiers and protect against various forms of attacks. This review aims to shed light on the diverse array of cybersecurity tools available and delve into the intricate world of cyber attacks, highlighting their evolving nature and the measures required to mitigate them.
a) Firewall Solutions: Firewalls act as a first line of defense by monitoring and filtering incoming and outgoing network traffic. They provide granular control over network traffic and help prevent unauthorized access to systems.
b) Antivirus and Anti-Malware Software: These tools detect, quarantine, and eliminate malicious software such as viruses, worms, Trojans, and spyware. They employ heuristic analysis and real-time scanning to identify and neutralize threats.
c) Intrusion Detection and Prevention Systems (IDPS): IDPS tools monitor network traffic for suspicious activities and provide alerts or take action to prevent potential intrusions. They offer an additional layer of security by detecting and mitigating attacks in real-time.
d) Vulnerability Assessment Tools: These tools scan networks, systems, and applications to identify vulnerabilities that can be exploited by attackers. They help organizations prioritize and remediate security flaws before they are exploited.
e) Data Encryption Tools: Encryption tools protect sensitive data by converting it into an unreadable format, which can only be decrypted with a specific key. They play a vital role in safeguarding data during transmission and storage.
a) Phishing Attacks: Phishing involves the use of deceptive emails or websites to trick users into revealing sensitive information such as passwords or credit card details. Attackers often masquerade as trustworthy entities to lure victims into their traps.
b) Ransomware Attacks: Ransomware is a malicious software that encrypts a victim's data and demands a ransom in exchange for decryption. It has gained prominence due to its disruptive nature, targeting both individuals and organizations.
c) Distributed Denial of Service (DDoS) Attacks: DDoS attacks flood a target system or network with an overwhelming volume of traffic, rendering it inaccessible to legitimate users. Attackers often use botnets to orchestrate these attacks.
By Matas B
•Feb 14, 2023
Informative, well structured course. The main issue I have with it is the quality of audio. In many videos microphone quality, used for recording, was absolutely abysmal. The only saving grace in those videos were captions below the video. Although, in some rare cases the captions were in fact, completely incorrect or simply state, that the audio is INAUDIBLE. Moreover, some instructors speak too slow, but I don't consider it particularly a bad thing, because coursera provides the ability of speeding up the videos, which allows you to adjust the tempo to your preference. Finally, there were some minor errors on this course, speficailly with some quizes, for example week 1 quiz has a question of the topic that will only be discussed in week 4, this may demotivate some learners, who carefuly took-in all the information taught in the course throughout the week, only to find a question which was not discussed. Overal: To me personaliy, the drawbacks were not significant, I still enjoyed the course and the information provided. I love how each section and topic is structured. Moreover, I am glad, that many of the topics inter-connect with one another and you get to learn things gradually getting deeper and deeper into subject matter, while reinforcing your already acquired knowledge.
By Dominick L
•Mar 9, 2020
This was a great way for me to familiarize myself with the basic concepts of cybersecurity and IT which include the CIA Triad and what each of the letters mean, firewalls and the purposes, the basics of cryptography, the history and importance of cybersecurity in the late 20th and 21st Centuries, the types of malware and security and data breaches and how to combat them, various cybersecurity and IT resources, tools and online articles, and the careers one can start in Cybersecurity and IT.
The only critique I have with this course is that spelling and sentence structure in the paragraphs below some of the videos could be edited so that notes can be easier to read and understand in preparation for quizzes. I also do think some questions in some of the practice quizzes and end of the week quizzes could be worded better or could've been discussed more in the chapters.
Despite this, I plan to continue with the next 3 courses to earn my certificate. I recommend this course to any college students, college graduates or those thinking of switching to IT and Cybersecurity fields.
By A. S
•Dec 2, 2022
Some of the teachers could be better, as have more visually associated learning material rather than just expecting the user to listen to them talk. I mean by making a video of situation and shower the user how it's done in real life instead of just showing a chart. A fake situation could have been created to demonstrate this. Not everybody remembers what people say very well. Sometimes transcripts or subtitles didn't help because of the accents of speakers and the translation was wrong or marked inaudible where you actually needed the help udnerstanding it.
However, it is not a bad short course, but the time limitation actually kind of makes it such a crunch time it can get on the nerves struggling to learn the contents for the quiz. There was actually a lot of good information presented and helpful links, some of the reading materials were kind of long so it was hard to get through the entire thing but is great for understanding basic concepts. It is also a good thing for people who want experience to help them get a job.
By Richard M
•Feb 24, 2022
New to the "Certificate" world better known as MOOC Certificates. Yall be sure to go read about MOOC's before you advance in any sort of learning program like this. Just remember its a non-credit course, and I foudn this from Coursea Support:
"The “non-credit” course will not give you any academic credit towards your college/university. Nothing is mentioned about any certificate approval or non-approval from the actual course creators, neither from Coursera."
This sections wasn't too bad, had a few ending quizzes that got me but understood why after re-reading the questions. I would say the worst part of this course is there are tons of transcript issues that you will see, misspelled words in quizzes and MAINLY how hard it is to understand some of these people with heavy heavy accents and horrible microphones! I would say this course needs a lot of updating in all aspects of the lesson to make a better understanding of the Introduciton to Cybersecurity Tools & Cyber Attacks.
By Eva I
•Dec 25, 2020
There is a lot of useful information here and ultimately it serves its purpose well. However, the quality of the teaching materials is uneven. Some slides are much too dense (I marked a couple of those videos in individual feedback), and much of the course is very dry. There are some gems though: the critical thinking materials in week 1 are truly original and worthwhile even to someone who already knows computer security. The teaching method they use - grounding the topic in an interesting example, and inviting the audience to think about it in advance, is a great teaching method. The course could be improved by extending it to other sections.
By Shanti S
•Sep 14, 2023
It's really a great course to start for people who want to get a better understanding of the cybersecurity field. Although there is a lot of useful information, there are also several drawbacks, like the fact that the audio for some parts of the videos is not clear enough (and I end up having to rely fully on the subtitles in order to grasp the material better). And I hope in the future they will provide some PDF materials as an addition to their videos so their students can read them without having to go back to the videos. Anyway, I quite enjoy this course, and it motivates me to learn more about this field! :)
By Odudu E
•Mar 23, 2024
I found the course quite enjoyable and highly informative. It provided me with a solid foundation in cybersecurity, covering topics such as its history, various types of attacks, frameworks, and incident response. However, there were instances where I struggled to hear the instructors clearly due to low audio volume, and there were moments where I felt somewhat disconnected. Additionally, mentioning slide numbers without showing the slides made it challenging to follow along, resulting in a somewhat abstract learning experience. Nonetheless, I still found the course to be overall great and insightful.