Skip to main content
Guest user
My info
My courses
My calendar
My grades
My certifications
My preferences
Home
Course catalog
User Guide
English (en)
English (en)
فارسی (fa)
Login
Threat Modeling: Spoofing In Depth
Home
Courses
Threat Modeling: Spoofing In Depth
Start or Resume Course
Threat Modeling: Spoofing In Depth
Learn about one of the key threats to modern systems: spoofing, or authentication attacks. Explore ways that attackers spoof people, machines, file systems, and processes.
Content
7673