• Online, Self-Paced
Course Description
28|30|33|23|26

Learning Objectives

By the end of the course, students should be able to: Understand Initial Access Attack Vectors Such As: Drive-by Compromise Spear phishing Link Supply Chain Compromise Trusted Relationship

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.