Let’s start with a simple definition. What is penetration testing? Penetration testing is a type of test that helps to identify what kinds of attacks an infrastructure is vulnerable to. …
In this article, you will learn about a tool for protecting a network from both internal and external threats: the firewall. Let’s start with a simple definition. What is a …
A lot of cyberattacks are only effective if the attacker can repeat the same action many times. Instead of the attacker repeating this action manually, they often automate the process …
In this article, you will learn about a major defence against malware — antivirus software. More specifically, you will learn what it is and how it detects and removes malware. …
Types of Malware In this step, you will learn about some different examples of malware (malicious software). More specifically, you will learn about worms, viruses, Trojans, ransomware and spyware. Worms …
Many of us carry around extremely sensitive data in our pockets: our phones give us access to our bank accounts, to our work files and to our apps, among other …
What do Our Passwords Protect? Most of our online accounts are protected by a username and password combination. These passwords protect the data that we store in our accounts, whether …
Who Needs Access to What Data? There are lots of different types of data contained in a school network. There might be: Teaching materials and files Student academic records Staff …
So far in this course, you have learned about different ways to protect software and data from remote attackers. But what about the hardware that this information is stored on? …
Denial-of-service attacks A denial-of-service attack, or DoS attack, is any attack that aims to prevent access to a service for legitimate users. That service might be a website, an email …
SQL is a programming language used to communicate with databases. When a user signs in to a website that requires a username and password, SQL is used to send a …
Automated social engineering In the previous step, you saw the value of your data. Now, you will learn about social engineering attacks, in which attackers try to steal your data. …