Hacker Techniques, Tools, and Incident Handling

Course Information

Students examine and analyze the landscape, key terms and concepts. Security professional need to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.

Intake F25 SEM

Start Date Sep 09 / 2025

End Date

Prerequisite(s):

Acceptance into the Cyber Security Graduate Certificate program.

Computer Software Requirements:

Blank DVD’s and/or 4GB+ memory stick

Chats:

Yes

Group Work:

Yes