Linux User and Group Membership
You'll be introduced to user, group members, and permissions in the Linux OS.
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
Incident Response Plan Steps
You'll learn the steps necessary to create an incident response plan.
Scam and Digital Forgery
Provide knowledge about what is scam and digital forgery and how it works.
Special Permissions (Linux)
You'll become familiar with special permissions in the Linux operating system.
Application Hardening Process
You'll learn to recognize the steps in the Application Hardening Process.
Binary, Hex and Logic Gates
Computer Science Revision
Security Administration Process
You'll learn to recognize the steps in the Security Administration Process.
BULI SIBER (cyberbullying)
Anda yakin anda faham tentang buli siber 2019? Buktikan!
Cyber Security Awareness Review
eLearning Unit 2 Review