Course
The GDPR Guru (IAM0021)
Information Technology and Cybersecurity
The GDPR Guru (IAM0021)
Introduction:
In the digital age, personal data is like currency, worth billions of dollars worldwide. However, many people give away their personal information for free without realizing it. Luckily, there are regulations in place to help protect...
Viruses & Malware (IAM0049)
Information Technology and Cybersecurity
Viruses & Malware (IAM0049)
Introduction:
The Matrix was a groundbreaking movie that portrayed a dystopian future where technology had taken over. However, as technology has advanced, so has the need for better cybersecurity. The bad guys have the means to take control of...
Using a Strong Password (iAM0051)
Information Technology and Cybersecurity
Using a Strong Password (iAM0051)
Introduction:
Hacking is often portrayed in movies as a glamorous and inaccessible activity. However, in reality, hacking can happen to anyone with an online account, and the only thing standing between a criminal and your private information is a...
Phishing (iAM0057)
Information Technology and Cybersecurity
Phishing (iAM0057)
Introduction:
Phishing is a type of cyber attack that criminals use to obtain personal information, money, or other valuable assets. As phishing techniques become more sophisticated, it is essential to know how to protect yourself from becoming a...
Email Security (iAM0058)
Information Technology and Cybersecurity
Email Security (iAM0058)
Introduction:
In today's digital age, hackers and cybercriminals are always on the lookout for ways to gain access to your systems and personal information. One of the most common ways they do this is through email. Malware, phishing attacks, and...
Protection & Infection Control (iAM0062)
Information Technology and Cybersecurity
Protection & Infection Control (iAM0062)
Introduction:
In today's digital age, we spend a significant amount of time online, from work emails to social media. However, with the advancement of technology, cybersecurity threats have also increased. It is essential to take practical steps...
The Internet of Things (iAM0065)
Information Technology and Cybersecurity
The Internet of Things (iAM0065)
Introduction:
Toasters, kettles, refrigerators, and many other devices are becoming part of the Internet of Things (IoT). This means that they are being fitted with sensors that allow them to communicate with each other. While these features have...
Staying Safe Online (iAM0067)
Health and Safety
Staying Safe Online (iAM0067)
Introduction:
The internet has become an integral part of our lives, and we rely on it for various purposes. However, with the increasing use of the internet, the risks associated with it have also increased. Online predators, hackers, phishers,...
Spoofing Attacks (iAM0090)
Information Technology and Cybersecurity
Spoofing Attacks (iAM0090)
Introduction:
Spoofing is not just harmless fun. It can lead to serious consequences, such as clicking on malicious links or downloading harmful software. This puts individuals and companies at risk of loss.

Course Objectives:
This course aims to...
Denial of Service Attack (iAM0098)
Information Technology and Cybersecurity
Denial of Service Attack (iAM0098)
Introduction:
Have you ever experienced frustration when a website you are trying to access keeps crashing? This could be due to a Denial of Service (DoS) attack, which is a malicious attempt to disrupt the normal functioning of a website. In this...

Oh, no. Nothing was found.

Use a different term and try again.