Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

5 Summary of Week 3

This image shows silver spider-like robots on a patterned image.
Figure 29

You have taken a closer look at ways of keeping attackers from impersonating you online or infecting your devices with malware.

In the next part of the course, you will delve a little deeper into the technologies that underpin information security, first focusing on how to protect the networks that we depend on for transmitting our digital information and accessing online services.

There is some optional further reading in the next section relating to some basic precautions you should take before you go online.

You can now go to Week 4: Networking and communications [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] .