Ready to learn more?

Next Cohort: Jul 6-Jul 31

  • This field is for validation purposes and should be left unchanged.

By submitting your email address, you acknowledge and agree to CourseCompare.ca's Terms of Service and Privacy Policy.

Duration

4 weeks

Tuition

$298

 

Jul 6-Jul 31

Commitment

Part-Time

Delivery

Online

Scholarships

yes

Criminals use various cyber-attack techniques in order to steal information, commit fraud and cause physical or reputational damage to individuals, corporations and governments. Students will learn the various types of threat agents; cyber criminals, script kiddies, hacktivists, spies and malicious insiders. The types of malicious software; ransomware, spyware, adware, viruses, key loggers, Trojans and worms these criminals use in their attacks. How botnets of compromised zombie computers can be used for spam campaigns and distributed denial of service attacks. How social engineering, phishing and Man in the Middle Attacks can be used to compromise computers and networks. How Advanced Persistent Threats can covertly infiltrate and attack specific targets. How these virtual attacks can cause real world physical damage. How stolen data can lead to identity theft, account takeover, fraud, financial market manipulation and be used for money laundering and terrorist financing.

Ready to get started?

Next Cohort: Jul 6-Jul 31

  • This field is for validation purposes and should be left unchanged.

By submitting your email address, you acknowledge and agree to CourseCompare.ca's Terms of Service and Privacy Policy.

Other courses in Cyber Security