Cyber Security

SKU course-52 Category

R299.00

Cyber Security

SKU course-52 Category

Description

Cyber Security Fundamentals

What is Cyberspace?

What is Cyber Security?

Why is Cyber Security Important?

What is a Hacker?

 

Types of Malware

Worms

Viruses

Spyware

Trojans

 

Cyber Security Breaches

Phishing

Identity Theft

Harassment

Cyber Stalking

 

Types of Cyber Attacks

Password Attacks

Denial of Service Attacks

Passive Attacks

Penetration Testing

 

Prevention Tips

Craft a Strong Password

Two-Step Verification

Download Attachments With Care

Question Legitimacy of Websites

Mobile Protection

No Credit Card Numbers

Place Lock on Phone

Don’t Save Passwords

No Personalized Contacts Listed

 

Social Network Security

Don’t Reveal Location

Keep Birthdate Hidden

Have Private Profile

Don’t Link Accounts

 

Prevention Software

Firewalls

Virtual Private Networks

Anti-Virus & Anti-Spyware

Routine Updates

 

Critical Cyber Threats

Critical Cyber Threats

Cyber Terrorism

Cyber Warfare

Cyber Espionage

 

Defence Against Hackers

Cryptography

Digital Forensics

Intrusion Detection

Legal Recourse

Reviews

There are no reviews yet.

Be the first to review “Cyber Security”

Your email address will not be published. Required fields are marked *

Cyber Security Fundamentals

What is Cyberspace?

What is Cyber Security?

Why is Cyber Security Important?

What is a Hacker?

 

Types of Malware

Worms

Viruses

Spyware

Trojans

 

Cyber Security Breaches

Phishing

Identity Theft

Harassment

Cyber Stalking

 

Types of Cyber Attacks

Password Attacks

Denial of Service Attacks

Passive Attacks

Penetration Testing

 

Prevention Tips

Craft a Strong Password

Two-Step Verification

Download Attachments With Care

Question Legitimacy of Websites

Mobile Protection

No Credit Card Numbers

Place Lock on Phone

Don’t Save Passwords

No Personalized Contacts Listed

 

Social Network Security

Don’t Reveal Location

Keep Birthdate Hidden

Have Private Profile

Don’t Link Accounts

 

Prevention Software

Firewalls

Virtual Private Networks

Anti-Virus & Anti-Spyware

Routine Updates

 

Critical Cyber Threats

Critical Cyber Threats

Cyber Terrorism

Cyber Warfare

Cyber Espionage

 

Defence Against Hackers

Cryptography

Digital Forensics

Intrusion Detection

Legal Recourse

Cresta Help Chat
Send via WhatsApp
0