Cyber Security
Featured courses
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/75e351af-f0d2-431a-a7f8-97634f6bb5cd/d2895aab65942866a11983b6b89dd67a/20f07591c6fcb220ffe637cda29bb3f6/84f7e69969dea92a925508f7c1f9579a/78805a221a988e79ef3f42d7c5bfd418/conversions/62f0f273c21af_MicrosoftTeams-image-(9)-card.jpg)
Hello and welcome to this eLearning course for ‘Cyber Security 101’. By the end of this course you w...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/9dc3128d-e46c-4a61-a906-65e44fb51ef7/d2895aab65942866a11983b6b89dd67a/6883966fd8f918a4aa29be29d2c386fb/dd77279f7d325eec933f05b1672f6a1f/78805a221a988e79ef3f42d7c5bfd418/conversions/63171c703cec5_Shard-Course-Image-intro-to-CS-800x450-card.jpg)
Hello and welcome to this eLearning course for an Introduction to Cyber Security!By the end of the c...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/f0d5d10f-a0d1-42f7-9fd8-610e96d8c61d/d2895aab65942866a11983b6b89dd67a/c4ca4238a0b923820dcc509a6f75849b/8c235f89a8143a28a1d6067e959dd858/78805a221a988e79ef3f42d7c5bfd418/conversions/62fb7fd579a73_denial-of-service-attack-card.jpg)
Don’t you just hate it when a website you are trying to access keeps crashing? Sometimes this happen...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/b323e04e-c9e7-4471-95e2-15dfa4da3d5c/d2895aab65942866a11983b6b89dd67a/c81e728d9d4c2f636f067f89cc14862c/847cc55b7032108eee6dd897f3bca8a5/78805a221a988e79ef3f42d7c5bfd418/conversions/62fb81c84c129_email-security-card.jpg)
Hackers and cybercriminals are always trying to find a way into your systems for their own personal...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/b617f183-16e9-4416-809f-5b085fa83d48/d2895aab65942866a11983b6b89dd67a/f033ab37c30201f73f142449d037028d/90794e3b050f815354e3e29e977a88ab/78805a221a988e79ef3f42d7c5bfd418/conversions/62fbaa743029d_phishing-card.jpg)
Ever heard of Phishing? We’re not talking about an angler baiting their rod and casting to see what...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/b524f93a-4546-4e22-93e9-748e29a97571/d2895aab65942866a11983b6b89dd67a/43ec517d68b6edd3015b3edc9a11367b/b7892fb3c2f009c65f686f6355c895b5/78805a221a988e79ef3f42d7c5bfd418/conversions/62fbaabb0345a_protection-infection-control-card.jpg)
We spend a huge portion of our life online. From work emails and online banking, to iCloud and socia...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/938cc536-1f4e-41f9-9484-2c42f9456611/d2895aab65942866a11983b6b89dd67a/68d30a9594728bc39aa24be94b319d21/92262bf907af914b95a0fc33c3f33bf6/78805a221a988e79ef3f42d7c5bfd418/conversions/62fbac48d0684_spoofing-attacks-card.jpg)
If you thought that spoofing was just imitating something for fun, then think again. Scammers use ‘s...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/b199b4b1-2b9e-4d7d-948c-c9cc61a17b49/d2895aab65942866a11983b6b89dd67a/3ef815416f775098fe977004015c6193/b55ec28c52d5f6205684a473a2193564/78805a221a988e79ef3f42d7c5bfd418/conversions/62fbacb6be332_staying-safe-online-card.jpg)
Remember Tron? The light-bikes, the incredible outfits and the amazing 1980s CGI? Everyone wanted to...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/eb10424f-c39e-43d7-a6fc-7eaaae000ab0/d2895aab65942866a11983b6b89dd67a/93db85ed909c13838ff95ccfa94cebd9/2f885d0fbe2e131bfc9d98363e55d1d4/78805a221a988e79ef3f42d7c5bfd418/conversions/62fbad28d814c_the-gdpr-guru-card.jpg)
You wouldn’t sign a blank cheque and hand it to someone, would you? Well, for a start, no-one uses c...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/b02d2df2-baa0-4748-a931-0cebd23a2137/d2895aab65942866a11983b6b89dd67a/c7e1249ffc03eb9ded908c236bd1996d/4b6538a44a1dfdc2b83477cd76dee98e/78805a221a988e79ef3f42d7c5bfd418/conversions/62fbae39070ad_the-internet-of-things-card.jpg)
What do the following have in common? Toasters, kettles, refrigerators… Well, they’re all found in t...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/e40efe78-e462-4392-82c0-6d314eec60bc/d2895aab65942866a11983b6b89dd67a/2a38a4a9316c49e5a833517c45d31070/64223ccf70bbb65a3a4aceac37e21016/78805a221a988e79ef3f42d7c5bfd418/conversions/62fbae03259ff_using-a-strong-password-card.jpg)
We all love the films about hacking. Like when a detective is trying to get into a secret computer a...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/a86538ae-67ff-4275-a4c2-5a058108bd32/d2895aab65942866a11983b6b89dd67a/7647966b7343c29048673252e490f736/c8c41c4a18675a74e01c8a20e8a0f662/78805a221a988e79ef3f42d7c5bfd418/conversions/62fbae73531b5_viruses-malware-card.jpg)
Ah, The Matrix. Cutting edge cinema. It hasn’t aged well though, has it? Modern technology has alrea...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/5723de2b-674e-4058-ba10-05d938182f5c/d2895aab65942866a11983b6b89dd67a/b1d10e7bafa4421218a51b1e1f1b0ba2/0cb929eae7a499e50248a3a78f7acfc7/78805a221a988e79ef3f42d7c5bfd418/conversions/613b40c4663ab_PL05IT00361_r-card.jpg)
Cybersecurity: protecting your data and avoiding internet fraud.Guidance on how to recognise securit...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/75e351af-f0d2-431a-a7f8-97634f6bb5cd/d2895aab65942866a11983b6b89dd67a/20f07591c6fcb220ffe637cda29bb3f6/84f7e69969dea92a925508f7c1f9579a/78805a221a988e79ef3f42d7c5bfd418/conversions/62f0f273c21af_MicrosoftTeams-image-(9)-card.jpg)
Hello and welcome to this eLearning course for ‘Cyber Security 101’. By the end of this course you w...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/9dc3128d-e46c-4a61-a906-65e44fb51ef7/d2895aab65942866a11983b6b89dd67a/6883966fd8f918a4aa29be29d2c386fb/dd77279f7d325eec933f05b1672f6a1f/78805a221a988e79ef3f42d7c5bfd418/conversions/63171c703cec5_Shard-Course-Image-intro-to-CS-800x450-card.jpg)
Hello and welcome to this eLearning course for an Introduction to Cyber Security!By the end of the c...
<< Read More >>
![...](https://c2lprodcdn.azureedge.net/c2lprodukcontent/27d1ddd806eabee2ed7625d9cc4907ac/ada6bca7-e40d-4f13-91f5-2b487e3063ea/d2895aab65942866a11983b6b89dd67a/49182f81e6a13cf5eaa496d51fea6406/c7635bfd99248a2cdef8249ef7bfbef4/78805a221a988e79ef3f42d7c5bfd418/conversions/6317223d6a3b7_Shard-Course-Image-GDPR-101-800x450-card.jpg)
Hello and welcome to this eLearning course for ‘GDPR 101’. By the end of the course, you will be abl...
<< Read More >>