Students examine and analyze the landscape, key terms and concepts. Security professional need to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow. This course includes mandatory group work. We recommend viewing the course schedule immediately upon logging into the course to view course and group work requirements. Computer Software Requirements: Blank DVD’s and/or 4GB+ memory stick
Sign UpExplore our available course intakes, designed to fit your schedule with flexible start dates. Whether you're studying online or in-class, each session is structured to provide a clear learning pathway.