ber attacks, developing open source security tools and learning how malicious hackers behave. he...

1

Upload: others

Post on 04-Oct-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ber attacks, developing open source security tools and learning how malicious hackers behave. He also sits on a panel that, un- der the National Infocomm Com- peteney Framework,