Criminals use various cyber-attack techniques in order to steal information, commit fraud and cause physical or reputational damage to individuals, corporations and governments. Students will learn the various types of threat agents; cyber criminals, script kiddies, hacktivists, spies and malicious insiders. The types of malicious software; ransomware, spyware, adware, viruses, key loggers, Trojans and worms these criminals use in their attacks. How botnets of compromised zombie computers can be used for spam campaigns and distributed denial of service attacks. How social engineering, phishing and Man in the Middle Attacks can be used to compromise computers and networks. How Advanced Persistent Threats can covertly infiltrate and attack specific targets. How these virtual attacks can cause real world physical damage. How stolen data can lead to identity theft, account takeover, fraud, financial market manipulation and be used for money laundering and terrorist financing.