Loading...

Course Description

Students examine and analyze the landscape, key terms and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.

Prerequisites

None

Equivalents

None

Course Hours

60

Credit Value

4

Applies to the following Programs

Loading...

This course is not open for registration at this time.

If it is part of a program (listed at the bottom left), you may visit the program page to review the schedule of course offerings.

Required fields are indicated by .