Course Overview

This course will give you training in the 6 primary threat vectors most criminal hackers use to break into computer networks:

  • Email
  • Passwords
  • Mobile devices
  • Physical access
  • Social engineering
  • Insider threats

After accomplishing knowledge checks in each module and a 20-question final review you will receive a certificate.
Good luck!