WHAT YOU WILL LEARN
- Discuss the evolution of security based on historical events.
- List various types of malicious software.
- Describe key cyber security concepts including the CIA Triad, access management, incident response and common cyber security best practices.
- Identify key cyber security tools which include the following: firewall, anti-virus, cryptography, penetration testing and digital forensics.
- Teacher: Orina Makori
Preparation is always a key component to prevent, mitigate, control and recover from an emergency. Terrorist attacks are not an exception. No one wants to think about a terrorist attack but it is important to be prepared in case such an event happens. Terrorist attacks may include the use of explosives, flammable agents, biological and chemical agents causing detrimental impacts in multiple areas including infrastructure, economy, nature and human health. Adverse health effects resulting of this type of emergencies depend on the hazard and the type of attack, but hazards may include physical, biological, chemical, and nuclear hazards among others. Responding to these events requires a vast amount of resources. Emergency response and recovery workers should be trained to respond to these types of events and have access to recommendations for the selection and use of personal protective equipment against the different hazards they might face, such as biological and chemical agents.
This course provides information to help protect emergency responders in the event of a terrorist attack. This course also offers access to information on other important elements of a terrorism response such as safety management, safeguarding building ventilation, bloodborne Infectious Disease, mail handling, and chemical hazards.
Social media sites are developed as a tool to communicate with others by sharing personal information, photos, videos, comments and more. Community sites with user-generated content should be used responsibly. As is the case with this site, links to websites and other resources operated by third parties are provided solely as a convenience to the user.
Generally, when using social media, it is a common assumption that all users are solely responsible for their content – including posts, comments, likes, shares, tweets, re-tweets, follows and favorites.
This course entails:
- Introduction to social media ethics
- Social media etiquette
- Social media security - what you can do
- Social media predators
- My role in responsible use of social media
- Is social media important anyway