Enrolment options
Linked learning / IT / Security
Threat Modeling: Spoofing In Depth
Learn about one of the key threats to modern systems: spoofing, or authentication attacks. Explore ways that attackers spoof people, machines, file systems, and processes.
Guests cannot access this course. Please log in.