Blog
 

Course Catalog

In this module, learners are introduced to the concept of data security, its significance, and the risks posed by insecure data handling. 9:51 minutes

Cross-site scripting (XXS) allows attackers to run scripts in a victim’s browser to bypass access controls. In this module, we explain three types of XSS...

In this module, we’ll review common exploitation techniques and ways learners can protect applications from cross-site request forgery. 3:16 minutes

This module covers steps people can take to protect their home networks and personal devices, and the value of creating backups of important files. 5:31...

This module will define the cloud and different types of cloud services available, and explain the benefits and risks of cloud-based services. 6:53 minutes

BEC scams occur when attackers impersonate company stakeholders and trick your employees into transferring money or sharing confidential information. This module suggests defenses against this...

This module describes what incorrect implementation of authentication and session management functions are, and explains how it can allow attackers to assume other users’ identities....

This module covers broken access control, types of attacks and how to prevent them. 3:00 minutes

This security awareness module explains why top-level managers are targeted by malicious hackers, details common attack methods, and offers recommendations for avoiding security risks. 9:45...

Learn the signs that your computer or one of your devices has been hacked, and how to respond. 2:10 minutes

This interactive module explains money laundering and U.S. laws and regulations intended to combat money laundering activities. 10:02 minutes

Page 25 of 25