Securing Computers from Threats
You'll be introduced to how you can secure computers against future threats.
Interpreting Regular Permissions (Linux)
This game focuses on how to quickly interpret permissions on Linux using the chmod command and simple arithmetic.
Linux User and Group Membership
You'll be introduced to user, group members, and permissions in the Linux OS.
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
Incident Response Plan Steps
You'll learn the steps necessary to create an incident response plan.
Special Permissions (Linux)
You'll become familiar with special permissions in the Linux operating system.
Application Hardening Process
You'll learn to recognize the steps in the Application Hardening Process.
Security Administration Process
You'll learn to recognize the steps in the Security Administration Process.
CyberSecurity
Information security impacts our overall organizational stability, our resources and our organizational, staff & student/patient sensitive data. This game-based-assessment tests your retention of the PAATC CyberSecurity Awareness module.
Hardening Windows Process
You'll learn to recognize the steps in the Hardening Windows Process.