Introduction
Your course guide, Cory, explains that earlier in the course, you looked at a range of security techniques and technologies aimed at protecting your online identity, as well as your digital information, from malware.
This week explores different ways of protecting the underlying communication networks and computers we use from attack and you’ll also configure a firewall for the computers you use.
OpenLearn - Introduction to cyber security
Except for third party materials and otherwise, this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence, full copyright detail can be found in the acknowledgements section. Please see full copyright statement for details.

