Course
The Power of a Strong Password (CS001)
... /
Technology
/
Cybersecurity
The Power of a Strong Password (CS001)
How many times have you opened a new app and typed the same password you’ve had since forever? And if it doesn’t accept it, you say, “Ok, I’ll add a 1 on the end. A capital letter? Fine. Now it wants to recommend a password too? How on...
The Danger of Viruses and Malware (CS002)
... /
Technology
/
Cybersecurity
The Danger of Viruses and Malware (CS002)
There are lots of sci-fi classics about dystopian futures where the human race is enslaved by the technology it has created. All of this used to sound implausible, but take one look at social media today and you’ll see we’re not that far...
Keeping Your Data Safe (CS003)
... /
Technology
/
Cybersecurity
Keeping Your Data Safe (CS003)
There are currently over 4.5 billion internet users. That’s a mind-boggling amount of people creating data – no wonder the internet is called the “information superhighway.” With every webpage you visit, you leave a digital footprint. In...
The Risks of Ransomware (CS005)
... /
Technology
/
Cybersecurity
The Risks of Ransomware (CS005)
It’s been a stalwart of movie plots since cinema began: Bad guy kidnaps the love interest of the main protagonist, demands an impossible ransom, and hero has to try and save the day. When it happens on screen for your entertainment, it’s...
Network Security and Cloud Computing (CS006)
... /
Technology
/
Cybersecurity
Network Security and Cloud Computing (CS006)
Would you leave your house without first checking that all windows and doors are locked? Of course you wouldn’t, unless you live in a magical dreamland. Maybe you have a strong alarm system or motion detectors in place, too. These are vital and...
Phishing and Anti-Spam Software (CS007)
... /
Technology
/
Cybersecurity
Phishing and Anti-Spam Software (CS007)
Ever received an email from your bank which seems to be legit but, well, there’s something off about it? Maybe it starts with, “Dear valued customer” instead of using your name? If you have received anything like this, then it’s likely...
Social Engineering (CS008)
... /
Technology
/
Cybersecurity
Social Engineering (CS008)
“You must trust and believe in people, or life becomes impossible.” So said the famous Russian writer Anton Chekhov. And, well, he had a point. Without trust, we wouldn’t form friendships or relationships. But here’s the thing, Anton: you...
Internet of Things Attacks (CS009)
... /
Technology
/
Cybersecurity
Internet of Things Attacks (CS009)
Imagine a world where you can feed your cat or dog remotely via your cell phone and the thermostat is set to your ideal, toasty temperature. Wait a minute – we already live in that world! Yep, the future, aka the Internet of Things, is here and...
Security and Compliance Audits (CS010)
... /
Technology
/
Cybersecurity
Security and Compliance Audits (CS010)
Risk is everywhere. Just by having your morning shower, you risk getting shampoo in your eyes and being temporarily blinded by soapsuds. But it isn’t just humans who are at risk. Computer networks are also highly vulnerable and susceptible...
Identity Theft (CS011)
... /
Technology
/
Cybersecurity
Identity Theft (CS011)
Considering there’s over 7 billion people in the world, it’s pretty amazing that no 2 people have been found to have the same fingerprint. Even between identical twins! This just goes to show that our identities are completely and utterly...

Oh, no. Nothing was found.

Use a different term and try again.