5 hours 54 minutes

Video Description

This lesson covers adversaries. By adversaries, we mean who is responsible for attacks that compromise security of private information. These include: • Script Kiddies • Hackers • Elite • Non-Structured • Structured • Highly Structured • Nation State It is important to remember who might be after the data, which will help to discover any weaknesses and/or vulnerabilities that might exist in a system's security.

Up Next

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)

This course helps professionals in the industry build their credentials to advance within their organization, allowing them to learn valuable managerial skills as well as how to apply the best practices to keep organizations systems running well.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor