Skip to main content
Guest user
My info
My courses
My grades
My certifications
My preferences
Home
Course catalog
User Guide
English (en)
English (en)
فارسی (fa)
Login
Threat Modeling: Spoofing In Depth
Home
Courses
Threat Modeling: Spoofing In Depth
Start or Resume Course
Threat Modeling: Spoofing In Depth
Learn about one of the key threats to modern systems: spoofing, or authentication attacks. Explore ways that attackers spoof people, machines, file systems, and processes.
Content
7673