Course
How to Protect Yourself Against Phishing Attacks (006-ArtRise)
Information Technology and Cybersecurity
How to Protect Yourself Against Phishing Attacks (006-ArtRise)
Introduction:
Phishing attacks are becoming increasingly common in today's digital age. These attacks can result in the loss of sensitive information, financial loss, and even identity theft. It is essential to understand what phishing attacks are...
Dealing With Business Continuity and Disaster Recovery (BC004)
Business and Management
Dealing With Business Continuity and Disaster Recovery (BC004)
Introduction
Disasters are never a pleasant topic to think about, but in business, having a solid plan for disaster recovery is crucial for keeping your business running smoothly. However, simply having a plan on paper is not enough. You need to...
The Power of a Strong Password (CS001)
Information Technology and Cybersecurity
The Power of a Strong Password (CS001)
Introduction:
Have you ever found yourself typing the same password over and over again for different apps? Do you get frustrated when you have to add numbers or special characters to your password? While it may seem like a hassle, password...
The Danger of Viruses and Malware (CS002)
Information Technology and Cybersecurity
The Danger of Viruses and Malware (CS002)
Introduction:
In today's world, technology has become an integral part of our lives. However, with the increasing use of technology, the threat of viruses and malware has also increased. This has led to a dystopian future where the human race is...
The Risks of Ransomware (CS005)
Information Technology and Cybersecurity
The Risks of Ransomware (CS005)
Introduction:
Kidnapping has been a popular plot in movies for years, but in today's world, criminals have found an easier target: your data. Ransomware is a type of attack where a rogue element takes over your computer and encrypts your files,...
Network Security and Cloud Computing (CS006)
Information Technology and Cybersecurity
Network Security and Cloud Computing (CS006)
Introduction:
In today's world, security is a top priority for everyone. We take measures to secure our homes and belongings, but what about our digital assets? Computer networks and cloud storage systems are also at risk of virtual intruders...
Phishing and Anti-Spam Software (CS007)
Information Technology and Cybersecurity
Phishing and Anti-Spam Software (CS007)
Introduction:
Have you ever received an email from your bank that seems legit but feels off? If so, you may have been targeted by phishing criminals. Phishing is a malicious and widespread activity where scammers pretend to be from authorized...
Internet of Things Attacks (CS009)
Information Technology and Cybersecurity
Internet of Things Attacks (CS009)
Introduction:
The Internet of Things (IoT) has revolutionized the way we live our lives. With the ability to remotely control devices and access data, it has made our lives more efficient and convenient. However, with this connectivity comes...
Identity Theft (CS011)
Information Technology and Cybersecurity
Identity Theft (CS011)
Introduction:
Identity theft is a serious crime that can have devastating consequences for its victims. Despite the fact that each person's identity is unique, cybercriminals have found ways to steal personal information and commit identity theft....
Information Security (CS016)
Information Technology and Cybersecurity
Information Security (CS016)
Introduction
Infosec, or information security, is a crucial aspect of our digital world. With the increasing amount of sensitive information being shared online, it is important to understand the basics of information security to protect ourselves...

Oh, no. Nothing was found.

Use a different term and try again.