Application Hardening Process
You'll learn to recognize the steps in the Application Hardening Process.
Basic Access Protocols
Use the clue to guess the term
Binary, Hex and Logic Gates
Computer Science Revision
Bingo: IoT Security
IoT Security
Business Information System BIS security 2
Business Information System (security)
California Consumer Privacy Act: CCPA World Series
Test your knowledge on who is affected by CCPA
Common Security Acronyms 2
Test your knowledge of acronyms related to IT security.
Cyber Incident Response
Match the goal of each step in the cyber incident response process
Cyber Security Awareness Review
eLearning Unit 2 Review
CYBER SECURITY EDUCATION (Malay Language)
A game focusing on cyber security with questions in Bahasa Malaysia. The questions were composed based on a video on cyber security.