Description
In this module, you will learn about attacks such as Brute force, Cipher text-only, Known plaintext, Chosen plaintext, Chosen ciphertext, Block cipher, Weak Key, Algebraic, Stream cipher, Hash function, Message authentication, Man-in-the-middle, Implementation, Side channel, Fault Analysis, Probing, Factoring, Random number generator, Rainbow table, Dictionary attacks, Reverse engineering, Social engineering and Other attacks.
Facility Utilities
Access Control
Confidentiality, Integrity and Availability
Risk Documentation
Introduction to Risk Management Framework (RMF)
Risk Management


