Who Wants To Be Secured!
As a business owner, test your current understanding of cyber security awareness and multi-factor authentication knowledge with our Who Wanted To Be Secured! game.
Who Wants To Be Cyber Safe!
Test yourself cyber security and multi-factor authentication knowledge with Who Wants To Be Cyber Safe!
Who Wants to be a Cyber Security Expert
Earn the most points answering questions about Cyber Security Awareness
Virus Match
By MJ Tech Support
Unit 7 Vocabulary - IT Security
Try to collect as many vegetables as you can to make your own delicious chakalaka!
Threat Modeling (STRIDE)
You'll be asked to match definitions within the STRIDE categories, which is used in risk analysis and threat modeling.
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
The Invention Of The Smartphone
The invention of the smartphone
Symmetric & Asymmetric Cryptography Review
In this game, you'll review of symmetric, asymmetric, and hashing encryption algorithms
Special Permissions (Linux)
You'll become familiar with special permissions in the Linux operating system.