In this course, you will learn
- Questions you need to ask to prepare a vulnerability assessment.
- Ways to interact with public agency staff who might feel it is wrong to reveal evidence of a cyber attack.
- The rules of confidentiality that apply to studying cybersecurity breaches.
- The scale, scope and impact of cyber attacks that are already happening.