Enrolment options

Linked learning / IT / Security

Threat Modeling: Spoofing In Depth

Learn about one of the key threats to modern systems: spoofing, or authentication attacks. Explore ways that attackers spoof people, machines, file systems, and processes.
Guests cannot access this course. Please log in.