Full course description
This module is an introductory module that is the second module in the Foundations of Space and Cybersecurity program. Covering core cybersecurity principles, learners will examine current threats and attacks against software applications and operating systems. Deception through spoofing, interference through jamming, and other malicious software such as ransomware are examples of what will be introduced. Learners will also appraise the impact of cybersecurity attacks.
Module 1 must be completed through Space Career Academy (SCA) before completing Module 2.
Module 1 must be completed through Space Career Academy (SCA) before completing Module 2.
Module 1 must be completed through Space Career Academy (SCA) before completing Module 2.uctory module that is the second module in the Foundations of Space and Cybersecurity program. Covering core cybersecurity principles, learners will examine current threats and attacks against software applications and operating systems. Deception through spoofing, interference through jamming, and other malicious software such as ransomware are examples of what will be introduced. LearThis module is an introductory module that is the second module in the Foundations of Space and Cybersecurity program. Covering core cybersecurity principles, learners will examine current threats and attacks against software applications and operating systems. Deception through spoofing, interference through jamming, and other malicious software such as ransomware are examples of what will be introduced. Learners will also appraise the impact of cybersecurity attacks.
Module 1 must be completed through Space Career Academy (SCA) before completing Module 2.ners will also appraise the impact of cybersecurity attacks.
Module 1 must be completed through Space Career Academy (SCA) before completing Module 2.

