Skip main navigation

£199.99 £139.99 for one year of Unlimited learning. Offer ends on 28 February 2023 at 23:59 (UTC). T&Cs apply

Find out more

What is penetration testing?

Let’s start with a simple definition. What is penetration testing? Penetration testing is a type of test that helps to identify what kinds of attacks an infrastructure is vulnerable to. …

What is a firewall?

In this article, you will learn about a tool for protecting a network from both internal and external threats: the firewall. Let’s start with a simple definition. What is a …

What are bots, and why can they be a problem?

A lot of cyberattacks are only effective if the attacker can repeat the same action many times. Instead of the attacker repeating this action manually, they often automate the process …

How Does an Antivirus Software Work?

 In this article, you will learn about a major defence against malware — antivirus software. More specifically, you will learn what it is and how it detects and removes malware. …

What are the Different Types of Malware?

Types of Malware In this step, you will learn about some different examples of malware (malicious software). More specifically, you will learn about worms, viruses, Trojans, ransomware and spyware. Worms …

Types of Phone Security

Many of us carry around extremely sensitive data in our pockets: our phones give us access to our bank accounts, to our work files and to our apps, among other …

Why is Password Security Important?

What do Our Passwords Protect? Most of our online accounts are protected by a username and password combination. These passwords protect the data that we store in our accounts, whether …

Data Access Control

Who Needs Access to What Data? There are lots of different types of data contained in a school network. There might be: Teaching materials and files Student academic records Staff …

Physical Security of Data Systems

So far in this course, you have learned about different ways to protect software and data from remote attackers. But what about the hardware that this information is stored on? …

DoS and DDoS attacks

Denial-of-service attacks A denial-of-service attack, or DoS attack, is any attack that aims to prevent access to a service for legitimate users. That service might be a website, an email …

SQL injections and input sanitisation

SQL is a programming language used to communicate with databases. When a user signs in to a website that requires a username and password, SQL is used to send a …

Social engineering

Automated social engineering In the previous step, you saw the value of your data. Now, you will learn about social engineering attacks, in which attackers try to steal your data. …