Learners create and analyze a SWOT diagram showing Strengths, Weaknesses, Opportunities, and Threats for their work or personal lives.
By Rosie Bunnow
Know the threats. Block the breach. This module breaks down how common web attacks like SQL Injection and Cross-Site Scripting work—and how to stop them.
By Steve Ebben
In this learning activity, you'll explore what malware is, what the different types of malware are, and how you can protect your computer from these threats.