Mohawk Cyber Security Modules

Cyber security involves protecting you, your information, devices and networks from hackers and other malicious people. When you think of cyber security, you probably think of people trying to break into highly secured companies and devices using very technical methods. In reality, a lot of attacks are done through social means, and everyone can be the target of a hacker.

These modules were made possible through funding from CIRA (the Canadian Internet Registration Authority) and their Community Investment Program, Mohawk College has been developing customized cyber security modules for Indigenous learners, journalism students and professionals, and high school students. They will take you through understanding why someone would target you, best practices to avoid being hacked, and what to do if you are compromised

To learn more about the Community Investment Program funding we received for development, see our website.

Cyber Security for Indigenous Learners

Discover best practices for working and learning from home, how to protect yourself from being hacked, the potential dangers of social media platforms and more.

Each section below will contain a modules for you to complete, as well as an checklist to ensure that you have implemented the contents of the module, and checked your understanding.

Why Would Someone Hack Me?

Learn about why you are an attractive target for hacking attempts. In this module, you will explore hacker motivations, what your information is worth, and best practices to protect yourself.

Check out our "Why Would Someone Hack Me?" video playlist!

"Why Would Someone Hack Me?" Module (Downloads .pptx)

"Why Would Someone Hack Me?" Activity Sheet (Downloads .docx)

Password Security

Learn what password security is, how to improve your passwords and what a password manager is. This module will also show you how  to check if your passwords have been compromised.

Check out our password security video playlist!

Password Security Module (Downloads .pptx)

Password Security Activity Sheet (Downloads .docx)

Phishing

Discover the different types of phishing attacks, ways to identify a phishing attempt, examine real phishing examples and learn what to do if you click on a link in a phishing email.

Access our Phishing video playlist!

Introduction to Phishing Module (Downloads .pptx)

Identify Examples of Phishing Module (Downloads .pptx)

Phishing Activity Sheet (Downloads .docx)

Social Media Awareness and Security

Hackers have been known to target individuals through social media. Learn the different attack vectors, what they are after, and best practices for social media security and privacy.

Social Media Security video playlist!

Improving your Social Media Security video playlist!

Social Media Security Introduction and Best Practices Module (Downloads .pptx)

Social Media Security Threats Module (Downloads .pptx)

Improving Social Media Security Module (Downloads .pptx)

Social Media Security Activity Sheet (Downloads .docx)

Secure Remote Working

Learning and working remotely have become a big part of our lives. Learn about the tools and best practices to work remotely in a secure way for both your professional and personal lives.

Secure Remote Working video playlist!

Secure Remote Working Best Practices Module (Downloads .pptx)

Secure Remote Working Software Module (Downloads .pptx)

Secure Remote Working Activity Sheet (Downloads .docx)

Web Browser Security

In this three part module, you will learn about web browser security, and learn how to secure your current browser on both computers and mobile devices.

Watch the Web Browser Security and Privacy video!

Watch the Web Browser Security and Privacy for Mobile video!

Watch our Increasing Web Browser Security Playlist!

Web Browser Security Module (Downloads .pptx)

Web Browser Security Activity Sheet (Downloads .docx)

Mobile Security

Explore how to protect your mobile devices with this module. We will explore different applications, device settings, and general best practices to keep you safe.

Mobile Security video playlist!

Mobile Security Module (Downloads .pptx)

Mobile Security Activity Sheet (Downloads .docx)

Internet of Things (IoT) Device Security

Learn about various Internet of Things devices, and the best practices to secure them.

Watch our IoT Security video!

IoT Device Types (Downloads .pptx)

IoT Device Best Practices (Downloads .pptx)

IoT Device Activity Sheet (Downloads .docx)

Spyware and Malware

Explore the different kinds of malware, including ransomware and spyware. It will also give you an overview of how to identify if your device has been infected, how to clean your device with antivirus software.

Video on Spyware and Malware!

Spyware and Malware Module (Downloads .pptx)

Spyware and Malware Activity Sheet (Downloads .docx)

Encryption

Discover what encryption is, common types of encryption, and best practices for protecting your data. This module also includes information on password protecting, encrypting and redacting documents.

Encryption Video Series!

Encryption Module (Downloads .pptx)

File Password Protection and Redaction (Downloads .pptx)

Encryption Activity Sheet (Downloads .docx)

Secure Online Shopping and Payments

Discover how financial information is secured when using the internet. You will also learn about online banking, credit card best practices, mobile payment applications, doing taxes online, and more!

 
 

Cyber Security for Journalism Professionals

Learn about social media security, geotagging, spyware, social engineering, and more.

Click the links below learn the most important things every journalist should know about cyber security. Once complete, scroll down a bit lower to see more in depth modules about a variety of cyber security topics.

Introduction to cybersecurity for journalists (Downloads .pptx)

Introduction to cybersecurity threats faced by journalists (Downloads .pptx)

Journalism Cyber Security Videos.

Each section below will contain a modules for you to complete, as well as an checklist to ensure that you have implemented the contents of the module, and checked your understanding.

Why Would Someone Hack Me?

Learn about why you are an attractive target for hacking attempts. In this module, you will explore hacker motivations, what your information is worth, and best practices to protect yourself.

Check out our "Why Would Someone Hack Me?" video playlist!

"Why Would Someone Hack Me?" Module (Downloads .pptx)

"Why Would Someone Hack Me?" Activity Sheet (Downloads .docx)

Password Security

Learn what password security is, how to improve your passwords and what a password manager is. This module will also show you how  to check if your passwords have been compromised.

Check out our password security video playlist!

Password Security Module (Downloads .pptx)

Password Security Activity Sheet (Downloads .docx)

Phishing

Discover the different types of phishing attacks, ways to identify a phishing attempt, examine real phishing examples and learn what to do if you click on a link in a phishing email.

Access our Phishing video playlist!

Introduction to Phishing Module (Downloads .pptx)

Identify Examples of Phishing Module (Downloads .pptx)

Phishing Activity Sheet (Downloads .docx)

Social Media Awareness and Security

Hackers have been known to target individuals through social media. Learn the different attack vectors, what they are after, and best practices for social media security and privacy.

View the Social Media Security video playlist!

View the Improving your Social Media Security video playlist!

Social Media Security Introduction and Best Practices Module (Downloads .pptx)

Social Media Security Threats Module (Downloads .pptx)

Improving Social Media Security Module (Downloads .pptx)

Social Media Security Activity Sheet (Downloads .docx)

Secure Remote Working

Learning and working remotely have become a big part of our lives. Learn about the tools and best practices to work remotely in a secure way for both your professional and personal lives.

View out Secure Remote Working video playlist!

Secure Remote Working Best Practices Module (Downloads .pptx)

Secure Remote Working Software Module (Downloads .pptx)

Secure Remote Working Activity Sheet (Downloads .docx)

Web Browser Security

In this three part module, you will learn about web browser security, and learn how to secure your current browser on both computers and mobile devices.

Watch the Web Browser Security and Privacy video!

Watch the Web Browser Security and Privacy for Mobile video!

Watch our Increasing Web Browser Security Playlist!

Web Browser Security Module (Downloads .pptx)

Web Browser Security Activity Sheet (Downloads .docx)

Mobile Security

Explore how to protect your mobile devices with this module. We will explore different applications, device settings, and general best practices to keep you safe.

Mobile Security video playlist!

Mobile Security Module (Downloads .pptx)

Mobile Security Activity Sheet (Downloads .docx)

Internet of Things (IoT) Device Security

Learn about various Internet of Things devices, and the best practices to secure them.

Watch our IoT Security video!

IoT Device Types (Downloads .pptx)

IoT Device Best Practices (Downloads .pptx)

IoT Device Activity Sheet (Downloads .docx)

Spyware and Malware

Explore the different kinds of malware, including ransomware and spyware. It will also give you an overview of how to identify if your device has been infected, how to clean your device with antivirus software.

Video on Spyware and Malware!

Spyware and Malware Module (Downloads .pptx)

Spyware and Malware Activity Sheet (Downloads .docx)

Encryption

Discover what encryption is, common types of encryption, and best practices for protecting your data. This module also includes information on password protecting, encrypting and redacting documents.

Encryption Video Series!

Encryption Module (Downloads .pptx)

File Password Protection and Redaction (Downloads .pptx)

Encryption Activity Sheet (Downloads .docx)

Secure Online Shopping and Payments

Discover how financial information is secured when using the internet. You will also learn about online banking, credit card best practices, mobile payment applications, doing taxes online, and more!

Why Would Someone Hack Me?

Learn about why you are an attractive target for hacking attempts. In this module, you will explore hacker motivations, what your information is worth, and best practices to protect yourself.

Check out our "Why Would Someone Hack Me?" video playlist!

"Why Would Someone Hack Me?" Module (Downloads .pptx)

"Why Would Someone Hack Me?" Activity Sheet (Downloads .docx)

Password Security

Learn what password security is, how to improve your passwords and what a password manager is. This module will also show you how  to check if your passwords have been compromised.

Check out our password security video playlist!

Password Security Module (Downloads .pptx)

Password Security Activity Sheet (Downloads .docx)

Phishing

Discover the different types of phishing attacks, ways to identify a phishing attempt, examine real phishing examples and learn what to do if you click on a link in a phishing email.

Access our Phishing video playlist!

Introduction to Phishing Module (Downloads .pptx)

Identify Examples of Phishing Module (Downloads .pptx)

Phishing Activity Sheet (Downloads .docx)

Social Media Awareness and Security

Hackers have been known to target individuals through social media. Learn the different attack vectors, what they are after, and best practices for social media security and privacy.

View the Social Media Security video playlist!

View the Improving your Social Media Security video playlist!

Social Media Security Introduction and Best Practices Module (Downloads .pptx)

Social Media Security Threats Module (Downloads .pptx)

Improving Social Media Security Module (Downloads .pptx)

Social Media Security Activity Sheet (Downloads .docx)

Secure Remote Working

Learning and working remotely have become a big part of our lives. Learn about the tools and best practices to work remotely in a secure way for both your professional and personal lives.

View out Secure Remote Working video playlist!

Secure Remote Working Best Practices Module (Downloads .pptx)

Secure Remote Working Software Module (Downloads .pptx)

Secure Remote Working Activity Sheet (Downloads .docx)

Web Browser Security

In this three part module, you will learn about web browser security, and learn how to secure your current browser on both computers and mobile devices.

Watch the Web Browser Security and Privacy video!

Watch the Web Browser Security and Privacy for Mobile video!

Watch our Increasing Web Browser Security Playlist!

Web Browser Security Module (Downloads .pptx)

Web Browser Security Activity Sheet (Downloads .docx)

Mobile Security

Explore how to protect your mobile devices with this module. We will explore different applications, device settings, and general best practices to keep you safe.

Check out the Mobile Security video playlist!

Mobile Security Module (Downloads .pptx)

Mobile Security Activity Sheet (Downloads .docx)

Internet of Things (IoT) Device Security

Learn about various Internet of Things devices, and the best practices to secure them.

Watch our IoT Security video!

IoT Device Types (Downloads .pptx)

IoT Device Best Practices (Downloads .pptx)

IoT Device Activity Sheet (Downloads .docx)

Spyware and Malware

Explore the different kinds of malware, including ransomware and spyware. It will also give you an overview of how to identify if your device has been infected, how to clean your device with antivirus software.

Video on Spyware and Malware!

Spyware and Malware Module (Downloads .pptx)

Spyware and Malware Activity Sheet (Downloads .docx)

Encryption

Discover what encryption is, common types of encryption, and best practices for protecting your data. This module also includes information on password protecting, encrypting and redacting documents.

Encryption Video Series!

Encryption Module (Downloads .pptx)

File Password Protection and Redaction (Downloads .pptx)

Encryption Activity Sheet (Downloads .docx)

Secure Online Shopping and Payments

Discover how financial information is secured when using the internet. You will also learn about online banking, credit card best practices, mobile payment applications, doing taxes online, and more!


CIRA logo

About CIRA

  • CIRA is the Canadian Internet Registration Authority, a member-based not-for-profit best known for its management and stewardship of the .CA domain on behalf of all Canadians.
  • CIRA’s Community Investment Program supports initiatives that build a trusted internet for Canadians.
  • CIRA is contributing to a safer, more secure and reliable Canadian internet by maintaining a trusted .CA domain, by developing new products and services that directly strengthen the Canadian internet and by giving back to the internet community in Canada.
  • CIRA is actively building a stronger internet in Canada by funding projects with charities, not-for-profits and the academic community that are doing good things for and through the Canadian internet.
  • Digital technologies offer important opportunities for the non-profit sector in Canada and project funding from CIRA helps organizations innovate.
  • Revenue from the registrations and renewals of .CA domains support CIRA’s Community Investment Program.

To learn more about CIRA, please see their website.

Contact Us!

Lucas Robinson

Academic Integration Specialist

lucas.robinson [at] mohawkcollege.ca (lucas[dot]robinson[at]mohawkcollege[dot]ca)