Module 1 | Getting Started | |
---|---|---|
Unit 1 | Introduction (0:38) | |
Module 2 | Cyber security Fundamentals | |
Unit 1 | Cybersecurity (3:51) | |
Unit 2 | Cybersecurity Case Study (0:25) | |
Module 3 | Types of Malware | |
Unit 1 | Types of Malware (2:49) | |
Unit 2 | Types of Malware Case Study (0:28) | |
Module 4 | Cyber Security Breaches | |
Unit 1 | Cyber Security Breaches (4:06) | |
Unit 2 | Cyber Security Breaches Case Study (0:32) | |
Module 5 | Types of Cyber Attacks | |
Unit 1 | Types of Cyber Attacks (3:30) | |
Unit 2 | Types of Cyber Attacks Case Study (0:33) | |
Module 6 | Prevention Tips | |
Unit 1 | Prevention Tips (3:26) | |
Unit 2 | Prevention Tips Case Study (0:37) | |
Module 7 | Mobile Protection | |
Unit 1 | Mobile Protection (3:17) | |
Unit 2 | Mobile Protection Case Study (0:31) | |
Module 8 | Social Network Security | |
Unit 1 | Social Network Security (3:02) | |
Unit 2 | Social Network Security Case Study (0:37) | |
Module 9 | Prevention Software | |
Unit 1 | Prevention Software (4:09) | |
Unit 2 | Prevention Software Case Study (0:29) | |
Module 10 | Critical Cyber Threats | |
Unit 1 | Critical Cyber Threats (5:24) | |
Unit 2 | Critical Cyber Threats Case Study (0:26) | |
Module 11 | Defense Against Hackers | |
Unit 1 | Defense Against Hackers (5:09) | |
Unit 2 | Defense Against Hackers Case Study (0:34) | |
Unit 3 | Closing (0:20) |
Powered By WP Courseware