Online Threats and Vulnerabilities - Keys to Cybersecurity
Hello and welcome to the next Key to Cybersecurity. In this lesson you'll explore online threats and vulnerabilities.
In this key, you will learn to identify the characteristics of an email or text message that may be part of a phishing scam. You will also become more aware of the different types of threats and vulnerabilities.
Online Threats and Vulnerabilities
Ready for the Next Lesson?
Next we'll dive in-depth into defending yourself online and common authorization methods.