• Assessing the impact of various attack vectors including system hacking, web-based attacks, malware, and DoS incidents.
  • Understanding threats to mobile and cloud security.
  • Strategies for mitigating the impact of hijacking and impersonation attacks.