Unit 10 — Cybersecurity Principles

It worker suffering data loss
This unit discusses more basic concepts in IT security including: application security, common hacking techniques, and anti-virus software.

Welcome to Demo Mode!

Try our core activities below! To save your scores and earn certificates, create a free account or log in.

Core Training Activities

Improve your reading comprehension and vocabulary in context with our interactive reader.

Scene: It is 8:12AM in the SOC war room. Overnight, malware alerts have spiked sharply. A major client portal is timing out for some users in Europe. CISO: Good morning soldier! Bring me up to speed on the incident. SOC Analyst: Again, I am not really a soldier, but at 02:41 AM last night, our intrusion detection system flagged anomalous lateral movement from…

Test your understanding of the reading material with a quick comprehension quiz.

Demo Available

Multiple Choice Activity

Students will be able to select the best match between unit terms and their definitions.

Students will be able to listen to short audio clips in English and then spell them correctly.

Demo Available

Spelling and Recognition

Students will be able to identify and spell a vocabulary term correctly given only the definition.

Premium Practice

Master your pronunciation by recording yourself and receiving feedback from native-speaking teachers.

Bots are constantly scanning the Internet looking for websites vulnerable to CSRF exploits so they can spam, change passwords, or even transfer funds.
US
UK
Stuxnet was a computer worm that used multiple zero-day exploits to infiltrate Iranian nuclear enrichment facilities and sabotage their centrifuges.
US
UK
As many popular Internet protocols are still vulnerable to spoofing attacks, the general rule of programming is still: "trust nothing".
... and more sentences to practice.

Improve your formal and informal writing skills with guided essay questions and professional correction.

  • Describe a time when your network or computer was attacked by malware. Who was the bad actor? Where did the attack originate from? How did you resolve the issue?
  • Who was behaving more realistically, The SOC Analyst or the CISO? Was the SOC Analyst really a soldier? What did the narrator mean when she said, "Well, that was a bit much"? Do you agree with the narrator?