Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security
Course Introduction
Cyber Security - Introduction (2:33)
Module 1: What is Cyber Security & Digital Footprints
1.1 What is Cyber Security? (1:55)
1.2 Digital Footprints (2:30)
1.3 Key Tips (1:11)
Quiz Questions
Module 2: Cyber Dependent vs Cyber Enabled Crimes
2.1 Definitions (0:59)
2.2 Motivations (0:46)
Quiz Questions
Module 3: Cyber Fraud
3.1 What is Cyber Fraud (1:22)
3.2 Red Flags (0:47)
Quiz Questions
Module 4: Ransomware, Malware, and DDoS Attacks
4.1 Ransomware (1:03)
4.2 Malware (0:22)
4.3 DDoS Attacks (0:26)
4.4 Summary (0:38)
Quiz Questions
Module 5: OSINT (Open Source Intelligence)
5.1 What is OSINT (2:08)
Quiz Questions
Module 6: Exploring the Dark Web
6.1 The Dark Web (1:30)
Quiz Questions
Module 7: Cyber Harassment & Cyber Stalking
7.1 Cyber Harassment & Cyber Stalking (1:28)
Quiz Questions
Module 8: Hacking
8.1 What is Hacking? (0:42)
8.2 Types of Hackers (0:58)
8.3 Phases of Hacking (1:41)
8.4 Why Hacking is Dangerous (1:15)
8.5 Examples of Major Hacks & Safety Measures (0:43)
8.6 Safety Measures (1:12)
Quiz Questions
Module 9: Phishing
9.1 What is Phishing (0:38)
9.2 Types of Phishing (1:27)
9.3 Spoofed Email Addresses (1:35)
9.4 How to Protect Yourself (1:38)
Quiz Questions
Module 10: Social Media and Social Engineering
10.1 What is Social Engineering (0:49)
10.2 How Social Media is Used (1:24)
10.3 Safety Tips (1:04)
Quiz Questions
Module 11: WIFI Safety
11.1 What is WIFI (1:30)
11.2 Common WIFI Threats (0:33)
11.3 How to Stay Safe (1:08)
Quiz Questions
Module 12: Data Backup
12.1 What is Data Backup (1:11)
12.2 Types of Data Backup (0:39)
12.3 Tips for Effective Backup (0:56)
Quiz Questions
Closing Summary
Cyber Security - Closing Summary (1:16)
Feedback
Feedback
12.1 What is Data Backup
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock