Ready to learn more?
Next Cohort: Mar 15-Apr 9
By submitting your email address, you acknowledge and agree to CourseCompare.ca's Terms of Service and Privacy Policy.
Duration
4 weeks
Tuition
$298
Online
Mar 15-Apr 9
Commitment
Part-Time
Delivery
Online
Scholarships
yes
Criminals use various cyber-attack techniques in order to steal information, commit fraud and cause physical or reputational damage to individuals, corporations and governments. Students will learn the various types of threat agents; cyber criminals, script kiddies, hacktivists, spies and malicious insiders. The types of malicious software; ransomware, spyware, adware, viruses, key loggers, Trojans and worms these criminals use in their attacks. How botnets of compromised zombie computers can be used for spam campaigns and distributed denial of service attacks. How social engineering, phishing and Man in the Middle Attacks can be used to compromise computers and networks. How Advanced Persistent Threats can covertly infiltrate and attack specific targets. How these virtual attacks can cause real world physical damage. How stolen data can lead to identity theft, account takeover, fraud, financial market manipulation and be used for money laundering and terrorist financing.
Ready to get started?
Next Cohort: Mar 15-Apr 9
By submitting your email address, you acknowledge and agree to CourseCompare.ca's Terms of Service and Privacy Policy.