This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Module
Complete and Continue
Cyber Security Awareness
Introduction
Introduction to Cyber Security - Video (1:38)
Introduction to Cyber Security - Text
Course Content and Structure - Video (1:46)
Course Content and Structure - Text
Glossary and Terms Used - Video (3:25)
Glossary and Terms Used - Text
Malware
Malware Training - Video (6:02)
Malware Training - Text
Malware - Examples (2:58)
Malware - Quiz
Ransomware
Ransomware Training - Video (8:22)
Ransomware Training - Text
Ransomware - Examples (3:07)
Ransomware - Quiz
Phishing
Phishing Training - Video (8:12)
Phishing Training - Text
Phishing - Examples (2:49)
Phishing - Quiz
Spear Phishing
Spear Phishing Training - Video (6:46)
Spear Phishing Training - Text
Common Phishing Themes (2:49)
Spear Phishing - Quiz
Whaling
Whaling Training - Video (4:26)
Whaling Training - Text
Comparison between Real and Fake Emails (4:01)
Whaling - Quiz
Man in the Middle
Man in the Middle Training - Video (4:20)
Man in the Middle Training - Text
Man in the Middle - Examples (1:39)
Man in the Middle - Quiz
Social Engineering
Social Engineering Training - Video (4:49)
Social Engineering Training - Text
Social Engineering - Examples (3:07)
Social Engineering - Quiz
Spam
Spam Training - Video (6:52)
Spam Training - Text
Spam - Examples (2:13)
Spam - Quiz
Hackers
Hackers Training - Video (4:06)
Hackers Training - Text
Hacking - Examples (4:01)
Hacking - Quiz
Summary
Summary - Video (3:07)
Summary - Text
More Information - Links
Summary - Text
Module contents locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock