This is a ppt work about network information security.
According to the from Page 175 to Page 179 Phishing, Exploiting a vulnerability and Hot Potato in the Chapter 6 of the book cybersecurity attack and defense strategies 2 edition (attachment) to complete 4 pages of PowerPoint with notes
Attention! The PowerPoint must be completed with the content of these three headings and the topic is divided into three parts Phishing, Exploiting a vulnerability and Hot Potato
Explanation of concepts + practical examples
Friendly: If not completed in accordance with the requirements will affect the rating.