Read our cookies policy and privacy statement for more information.
×Denver, Colorado•
Computer networks and the data that travels upon them are under constant and increasing attack. This course will focus on a discussion of how state and non-state actors utilize this form of asymmetrical warfare to infiltrate government and corporate networks, risk management responds and risk strategies apply. Cross-listed with RISK 4209. Restriction: junior/senior standing or instructor permission.
Units: 3.0
Hours: 3 to 3