Hacker Techniques, Tools, and Incident Handling
Course Information
Students examine and analyze the landscape, key terms and concepts. Security professional need to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Students examine how attacks target networks and the methodology they follow.
Intake S26 SEM
Start Date May 12 / 2026
End Date
Prerequisite(s):
Acceptance into the Cyber Security Graduate Certificate program.
Computer Software Requirements:
Blank DVDs and/or 4GB+ memory stick
Chats:
Yes
Group Work:
Yes