Scam and Digital Forgery
Provide knowledge about what is scam and digital forgery and how it works.
Securing Computers from Threats
You'll be introduced to how you can secure computers against future threats.
Security - Mix and Match
This game tests user knowledge on security. The game will pick random pairs each time you play.
Security Administration Process
You'll learn to recognize the steps in the Security Administration Process.
Security Control Process
You'll learn the five steps to the Security Control Process.
Special Permissions (Linux)
You'll become familiar with special permissions in the Linux operating system.
Symmetric & Asymmetric Cryptography Review
In this game, you'll review of symmetric, asymmetric, and hashing encryption algorithms
The Invention Of The Smartphone
The invention of the smartphone
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
Threat Modeling (STRIDE)
You'll be asked to match definitions within the STRIDE categories, which is used in risk analysis and threat modeling.