Skip main navigation

Welcome to Week 2

In the coming week, we will focus on: how to secure your network through your users how to secure your machine By the end of this week, you will be …

MiTM Attacks

This article explores the concept of Man in the Middle attacks (MiTM). An MiTM attack is essentially when a hacker sits between you and where you are going on your …

Scareware: How to Protect Your Network

In this article, you will learn what to do about fake error messages and scareware. These attacks use amygdala hijacking, which we have already spoken about when we reviewed social …

How to Prevent Social Engineering

Vishing is another social engineering technique. Vishing – voice phishing – is essentially phishing over the phone. These attacks can also be adapted by having the hacker appear in person, …

Overview of Social Engineering

Social engineering is an act that influences a person to take action, and it is an important concept to understand when learning about how hackers will try to access your …

The Final Week Ahead

In the coming week, we will cover the following topics: Red Teams and Blue Teams how to track a hacker how to prepare for, and recover from, an attack By …

Welcome to Network Security

Over the next four weeks, you will learn why you could be a target for hackers, how hackers may try to breach your network, how you can protect your network …

Assessment in Securing Your Network from Attacks

We have incorporated quiz-based learning within this course. The benefit of quizzes are that they aid and support learning. They do not contribute towards your final score. They’re a fantastic …