Description
By the end of the course, you‘ll be able to...
-
Explain the meanings of terms describing common cyberattacks, such as phishing, pharming, shoulder surfing and blagging
-
Evaluate the strength of a password
-
Explain the protections offered to users by the Misuse of Computer Act
-
Describe different types of cyber attack, such as an “SQL injection attack”, and how these can be protected against or mitigated
-
Classify different types of malware
-
Explain how “anti-virus” software works