Project Description
(Last Updated On: )This course covers the fundamental building blocks required to understand threat and vulnerability landscapes through threat modeling and risk assessments. It covers malware, exploit kits, phishing, zero-day vulnerabilities, phishing, SMShing, vishing, identity theft, scam, cons and other social engineering threats, as well how to implement security control utilizing isolation and compartmentalization.