• Online, Self-Paced
Course Description

Exploits take form not only as technical entities, but also as employee workplace violations. Explore common exploits, including spoofing, packet forgery, and rootkits, and discover best practices for prevention.

Learning Objectives

{"recognize proper hiring practices"}

Framework Connections