Cyber Security
How do you hack?
-
5 mins
-
Online tutorial
This topic provides description of the 7 stages of a cyber attack from the attacker’s perspective. It highlights that not all hackers want to disguise their attack or cause destruction. After an explanatory animation, learners are invited to examine three common scenarios and decide which of the stages are involved in each case.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.
Cyber Security
What are the main types of cyber attack?
-
5 mins
-
Online tutorial
Not all cyber attacks are caused by external hackers – some people within an organisation are conscious or unwitting accomplices. This topic provides an outline of the three main classes of Cyber Attack and describes some simple ways organisations can mitigate these risks. The learner will take on a defender’s perspective, classifying some common examples and identifying how to defend against them.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.
Cyber Security
What are the common tools hackers use?
-
5 mins
-
Online tutorial
This topic looks at the common tools that are used by hackers and the symptoms caused by these tools. Acting from the attacker’s perspective, learners follow a hacker as she targets a company that she believes guilty of exploitation and dishonesty.
They explore the different technologies she could use and choose the most appropriate weapons for her attack.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.
Cyber Security
How can hackers use social engineering?
-
5 mins
-
Online tutorial
People are often surprised how much hackers and criminals can find out about them from their social media presence. Taking the attacker’s perspective, learners are invited to play the part of a social engineer gathering information on a person with a view to approaching them or stealing their identity.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.
Cyber Security
How can organisations protect against cyber attacks?
-
5 mins
-
Online tutorial
This topic uses animations to explore the many different layers and tools that an organisation can use to defend itself against hackers. Learners discover the basics of security architecture and find out why some of their important emails may never reach their intended destination.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.
Cyber Security
How can organisations test their defences?
-
5 mins
-
Online tutorial
People often wonder how organisations test the effectiveness of their defences. From red teaming to blue teaming, vulnerability assessments and pen testing, learners are introduced to the different options for assessing an organisation’s security.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.
Cyber Security
How can cyber attacks be detected?
-
5 mins
-
Online tutorial
A cyber attack is much like a sickness bug – in both cases, we go through similar steps to recognise and respond to the symptoms. Acting from a defender’s viewpoint, learners take the role of a systems administrator and decide which of a series of unusual occurrences are symptoms of an attack on the organisation.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.
Cyber Security
How can organisations respond to a cyber attack?
-
5 mins
-
Online tutorial
What happens when there’s a major cyber attack, and how does an organisation react to it and repair its defences? Based around a specific scenario, learners are invited to recognise the cost of not following an Incident Response Plan and the impact this can have on an organisation’s business and reputation.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.
Cyber Security
Who are the cyber threat actors?
-
5 mins
-
Online tutorial
This topic examines the main threat groups to different organisations and some of the motives, targets and methods associated with them. Taking the attacker’s perspective, it uses a card game to invite learners to match each threat group with a possible target, and discover what they may be trying to achieve.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.
Cyber Security
What motivates a hacker?
-
5 mins
-
Online tutorial
The terms White Hat, Black Hat and Grey Hat describe the motivations of different hackers and the kind of actions they are likely to take. But how clear-cut are their career paths? This topic introduces learners to Max, a teenage gamer on the brink of a hacking career, and invites learners to make some key career decisions on her behalf, which will determine which colour hat she will wear.
Price for this topic only: £30 excl. VAT
Buying access to a programme (which includes all topics) is recommended when interested in more topics. Discount codes only apply to programmes.