This course will give you training in the 6 primary threat vectors most criminal hackers use to break into computer networks:
- Passwords
- Mobile devices
- Physical access
- Social engineering
- Insider threats
After accomplishing knowledge checks in each module and a 20-question final review you will receive a certificate.
Good luck!