Online Threats and Vulnerabilities - Keys to Cybersecurity
Hello and welcome to the next Key to Cybersecurity. In this lesson you'll explore online threats and vulnerabilities.
Overview
In this key, you will learn to identify the characteristics of an email or text message that may be part of a phishing scam. You will also become more aware of the different types of threats and vulnerabilities.
Online Threats and Vulnerabilities
Title
Ready for the Next Lesson?
Description
Next we'll dive in-depth into defending yourself online and common authorization methods.