Skip to main content

Week 3: Malware

Completion requirements
View all sections of the document

This image shows a computer keyboard. Instead of letters and numbers, on each key is an emoji.

 2.5 Emails are not the only phish