Application Hardening Process
You'll learn to recognize the steps in the Application Hardening Process.
Basic Access Protocols
Use the clue to guess the term
Bingo: IoT Security
IoT Security
Business Information System BIS security 2
Business Information System (security)
California Consumer Privacy Act: CCPA World Series
Test your knowledge on who is affected by CCPA
Common Security Acronyms 2
Test your knowledge of acronyms related to IT security.
Computer Crime
Chapter 10 - G10 D&C
Cyber Incident Response
Match the goal of each step in the cyber incident response process
Cyber Security = High IQ
Cyber security is very important!
CYBER SECURITY EDUCATION (Malay Language)
A game focusing on cyber security with questions in Bahasa Malaysia. The questions were composed based on a video on cyber security.