Cyber Aware Anatomy of a Hack

The more you know...

Awareness leads to action.

It’s Time
to Buckle Up!

Big Take-Away

The protection of data from hackers is critically important and is a two-fold process:

The back-end process,
the IT department’s responsibility...

and the front-end part, what users can do to help lessen the risk.

This course provides an introduction to methods that hackers
might use to access a computer system
or network.

It also provides insight into how users like yourself can make the adversary’s job more difficult.

Let’s Go Select a module below to continue.

Earn your certificate by completing the Experience activities.

  1. Learn

    Learn about hackers and their motivations.

    Go to Module 1
  2. Experience

    Experience a cyber intrusion from the adversary’s perspective.

    Go to Module 2
  3. Examine

    Explore real-world intrusions and data breaches.

    Go to Module 3