This unit will take you on a journey of discovery of techniques that cyber criminals use to steal data, disrupt systems, and infiltrate networks. You will start by considering the value your data holds and what organisations might use it for. You will then learn about social engineering and other common cyber crimes, and finally look at methods to protect against these attacks.
Support is available
If you have any questions about the topic or any of the lesson resources you can contact us by emailing email@example.com.