|
May 09, 2025
|
|
|
|
CYBR 380 - Threat Mitigation and Incident Response This course covers motivations and techniques such as “The Adversary Model” types of attacks. These vulnerabilities enable attacks, conditions that suggest an attack has occurred, and threats in information sources, and legal issues associated with cyber threats. It will also cover in detail the following subjects: sub as password vulnerability, backdoors, trojans, viruses, wireless attacks, sniffing, spoofing, session hijacking, denial of service, distributed denial of services, and BOTS.
Prerequisite(s) CYBR 250 completed with a grade of “C” or higher Offered (FALL)
Add to Portfolio (opens a new window)
|
|