Course Description
28|30|33|23|26
Learning Objectives
By the end of the course, students should be able to:
Understand Initial Access Attack Vectors Such As:
Drive-by Compromise
Spear phishing Link
Supply Chain Compromise
Trusted Relationship