This unit will take you on a journey of discovery of techniques that cyber criminals use to steal data, disrupt systems, and infiltrate networks. You will start by considering the value your data holds and what organisations might use it for. You will then learn about social engineering and other common cyber crimes, and finally look at methods to protect against these attacks.
Support is available
Join our group live chat to gain support with this topic, available each weekday between 2 & 3pm.
Click here to access the group live chat.
To download any worksheet or resource from this unit, select "Save a copy" on the top right hand side of each document