IT Security/Threats
Appearance
This page may qualify for speedy deletion because: updating course with author's permission. Please delete subpages as well - they have not been marked with {{delete}}. If you disagree or intend to fix it, and you have not contributed to it before, you may remove this notice. If you have contributed before and disagree, please explain why on the discussion page, after adding {{hangon}} to the top of the . This will alert curators and custodians to your intention, and may permit you the time to write your explanation. Before deleting check the discussion page, what links here, history (last edit), the page log, and Wikiversity:Deletions. |
This section of the IT security course covers threats, including malware, attacks, social engineering, wireless, application, mitigation, tools, and testing.
Preparation
[edit | edit source]Learners should already be familiar with introductory computer concepts, computer support concepts, and computer networking concepts.
Lessons
[edit | edit source]- Malware
- Attacks
- Social Engineering
- Wireless Attacks
- Application Attacks
- Threat Mitigation
- Tools
- Testing