This course describes how cyber attacks through impersonation are conducted. It also provides practical advice and recommended security controls to implement, reducing the likelihood and impact of an impersonation cyber attack. This event may be a rebroadcast of a live event and the instructor will be available to answer your questions during the event.
The major topics that will be covered in this class include:
Who will benefit:
Everyone should attend this to help avoid becoming a victim of an impersonation cyber attack
This webcast is hosted on CPA Crossing platform. Attendees will receive instructions on how to attend the webcast via e-mail.