Enrolment options

Phases of a cyber-attack: reconnaissance, scanning, exploitation of faults and obtaining access, maintaining access, covering traces. Tools and hacking techniques used in cyber-attacks. Case Analysis of Cyber Attacks. Planning intrusion tests and considering legal aspects. Simulation of a cyberattack.
Guests cannot access this course. Please log in.