Loading...

Week 2: Cyber Threats

Week 2: Cyber Threats

During the second week, the participants will:

  • Cover cyber security threats, such as malware, identity theft, and social engineering.
  • Engage with practical case studies of real-life attacks