Skip to main content

Section outline

  • Learning Outcome

    MODUL  1:

    MODUL 2: Demonstrate a clear understanding of the roles and characteristics of attackers and hackers by distinguishing their intent, legality, and behavior in cybersecurity contexts.

    MODUL 3: Describe how each threat can affect systems or data.