Home
Categories
Business
Cloud Computing
Cybersecurity
Data Science
Design
Education
Finance & Accounting
Game Development
Lifestyle
Marketing
Music
No-code Development
Office Tools
Photography & Video
Programming languages
Webdevelopment
Pricing
Login
Coursetaker
Follow courses and learn!
Publisher
Create courses and expand the community.
Signup
Coursetaker
Follow courses and learn!
Publisher
Create courses and expand the community.
Chapter 1: Understanding Cyber Threats
Getting started
1 min
Cyber Security Fundamentals
3 min
Case Study | Cyber Security Fundamentals
1 min
Disastrous Business Trip to South America
3 min
Readings on Cybersecurity Fundamentals
3 min
Quiz
10 min
Types of Malware
3 min
Case Study | Types of Malware
1 min
Cyber Security Breaches
5 min
Case Study | Cyber Security Breaches
1 min
Stolen Hospital Laptop Causes Problems
3 min
Readings on Malware & Security Breaches
3 min
Quiz
10 min
Types of Cyber Attacks
4 min
Case Study | Types of Cyber Attacks
1 min
Capital One Corporation Data Breach
3 min
Readings on Malware and Cyberattacks
3 min
Words from the Wise | Cyber Attacks
3 min
Quiz
10 min
Lesson Summary
3 min
Chapter 2: Security Measures to Prevent Attacks
Prevention Tips
4 min
Case Study | Threat Prevention Tips
1 min
Mobile Phone Protection
3 min
Case Study | Mobile Phone Protection
1 min
A Firm’s Data is Being Sold on the Dark Web
3 min
Readings on Mobile Phone Protection
3 min
Quiz
10 min
Social Network Security
3 min
Case Study | Social Network Security
1 min
Prevention Software
5 min
Case Study | Prevention Software
1 min
Hotel Suffers From a Social Phishing Attack
3 min
Readings on Social Networks Security
3 min
Quiz
10 min
Critical Cyberthreats
6 min
Case Study | Critical Cyberthreats
1 min
Defence Against Hackers
5 min
Case Study | Defence Against Hackers
1 min
Uber Security Breach of 2016
3 min
Readings on Cyberthreats and Hackers
3 min
Quiz
10 min
Lesson Summary
3 min
Wrapping Up
2 min
Evaluation quiz
20 min
Chapter 1: Understanding Cyber Threats
Getting started
1 min
Cyber Security Fundamentals
3 min
Case Study | Cyber Security Fundamentals
1 min
Disastrous Business Trip to South America
3 min
Readings on Cybersecurity Fundamentals
3 min
Quiz
10 min
Types of Malware
3 min
Case Study | Types of Malware
1 min
Cyber Security Breaches
5 min
Case Study | Cyber Security Breaches
1 min
Stolen Hospital Laptop Causes Problems
3 min
Readings on Malware & Security Breaches
3 min
Quiz
10 min
Types of Cyber Attacks
4 min
Case Study | Types of Cyber Attacks
1 min
Capital One Corporation Data Breach
3 min
Readings on Malware and Cyberattacks
3 min
Words from the Wise | Cyber Attacks
3 min
Quiz
10 min
Lesson Summary
3 min
Chapter 2: Security Measures to Prevent Attacks
Prevention Tips
4 min
Case Study | Threat Prevention Tips
1 min
Mobile Phone Protection
3 min
Case Study | Mobile Phone Protection
1 min
A Firm’s Data is Being Sold on the Dark Web
3 min
Readings on Mobile Phone Protection
3 min
Quiz
10 min
Social Network Security
3 min
Case Study | Social Network Security
1 min
Prevention Software
5 min
Case Study | Prevention Software
1 min
Hotel Suffers From a Social Phishing Attack
3 min
Readings on Social Networks Security
3 min
Quiz
10 min
Critical Cyberthreats
6 min
Case Study | Critical Cyberthreats
1 min
Defence Against Hackers
5 min
Case Study | Defence Against Hackers
1 min
Uber Security Breach of 2016
3 min
Readings on Cyberthreats and Hackers
3 min
Quiz
10 min
Lesson Summary
3 min
Wrapping Up
2 min
Evaluation quiz
20 min
Enhancing Cybersecurity
Chapter 2: Security Measures to Prevent Attacks
Defence Against Hackers
Previous
Next