Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

5 Summary of Week 6

This image shows a man, from behind, wearing a baseball cap and holding a walkie-talkie.
Figure 10

This week has focused on techniques for network level protection of your digital life.

In particular you have learned the role of firewalls in protecting networks and configured a personal firewall for the computers you use. You have also learned how cryptography can be used to maintain the confidentiality, integrity and authenticity of network traffic and how networks can be automatically monitored to detect potential attacks.

You can now got to Week 7: When your defences fail [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] .