This course explores cyber threats and attacks targeting computer systems, infrastructures, networks, and personal devices. Topics cover a wide range of attack techniques such as backdoors, trojans, viruses, ransomware, wireless attacks, social engineering, and covert channels. Participants gain insight into password guessing, data interception, spoofing, session hijacking, disclosure, alteration, sabotage, repudiation threats, denial of service attacks, distributed denial of service attacks, bots, MAC spoofing, web application attacks, cloud computing attacks, zero-day exploits, and man-in-the-middle attacks. Special focus is given to advanced persistent threats, attack indication events, attack timing, attack surfaces, vectors, and trees.
هل كانت هذه الصفحة مفيدة؟
0% من المستخدمين قالو نعم من 0 تعليقا.
من فضلك أخبرنا بالسبب (يمكنك اختيار خيارات متعددة)