This is a scenario-based course in which you will learn about various cyber attacks used to target cleared defense contractors. An overarching scenario is threaded throughout the course to provide a context for more detailed scenarios that are specific to each attack type.
The most common cyber attacks leverage the following: