In this course, you will learn:
- To prepare a vulnerability assessment, you'll need to ask the following questions.
- Interacting with public-sector employees who believe it is unethical to report proof of a cyber-attack.
- The norms of confidentiality that apply to the investigation of cyber-attacks.
- The magnitude, extent, and impact of cyberattacks that have already occurred.