Explora nuestro catálogo interactivo de cursos y lleva tu desarrollo profesional al siguiente nivel. 📚✨
Learn about some of the most dangerous ways people can exploit the Internet’s vulnerabilities, including DDoS attacks (which flood websites with connection requests), “Trojans” (malware hidden inside an innocent piece of information), and “botnets” (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture these threats. This lecture, presented by Paul Rosenzweig, is from Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare. Learn how to protect yourself from cyber crime with this fascinating and timely course by an expert in cybersecurity law and policy.
Audio Languages | |
---|---|
Content Style | |
Course Text Languages | |
Subtitle Languages | American English |
Seat Time |
© 2025 Escal8. Todos los derechos reservados.