Course curriculum

  1. 1
    • Welcome

    • Welcome

  2. 2
    • Chapter 2 - Cybercrime

  3. 3
    • Chapter 3 - Consequences of Cybercrime

  4. 4
    • Chapter 4 - Recognizing Cyberattacks

  5. 5
    • Chapter 5 - Cyberattacks against Technology

  6. 6
    • Chapter 6 - Malware and Ransomware

  7. 7
    • Chapter 7 - Social Engineering

  8. 8
    • Chapter 8 - Phishing

  9. 9
    • Chapter 9 - Pretexting

  10. 10
    • Chapter 10 - Minimizing the Risks

  11. 11
    • Chapter 11 - Skepticism

  12. 12
    • Chapter 12 - Passwords

  13. 13
    • Chapter 13 - Cybersecurity Best Practices

  14. 14
    • Chapter 14 - Review

    • IT Risk & Cybersecurity Awareness Quiz

  15. 15
    • Have A Great Day!