Cyber security involves protecting you, your information, devices and networks from hackers and other malicious people. When you think of cyber security, you probably think of people trying to break into highly secured companies and devices using very technical methods. In reality, a lot of attacks are done through social means, and everyone can be the target of a hacker.
These modules were made possible through funding from CIRA (the Canadian Internet Registration Authority) and their Community Investment Program, Mohawk College has been developing customized cyber security modules for Indigenous learners, journalism students and professionals, and high school students. They will take you through understanding why someone would target you, best practices to avoid being hacked, and what to do if you are compromised
To learn more about the Community Investment Program funding we received for development, see our website.
Cyber Security for Indigenous Learners
Discover best practices for working and learning from home, how to protect yourself from being hacked, the potential dangers of social media platforms and more.
Each section below will contain a modules for you to complete, as well as an checklist to ensure that you have implemented the contents of the module, and checked your understanding.
Why Would Someone Hack Me?
Learn about why you are an attractive target for hacking attempts. In this module, you will explore hacker motivations, what your information is worth, and best practices to protect yourself.
Check out our "Why Would Someone Hack Me?" video playlist!
"Why Would Someone Hack Me?" Module (Downloads .pptx)
"Why Would Someone Hack Me?" Activity Sheet (Downloads .docx)
Being the Victim of a Hack
Learn about what to do if you are hacked. This module will also inform you about common hacking attacks.
Check out the Being a Victim of a Hack video playlist!
Being the Victim of a Hack Module (Downloads .pptx)
Password Security
Learn what password security is, how to improve your passwords and what a password manager is. This module will also show you how to check if your passwords have been compromised.
Check out our password security video playlist!
Phishing
Discover the different types of phishing attacks, ways to identify a phishing attempt, examine real phishing examples and learn what to do if you click on a link in a phishing email.
Access our Phishing video playlist!
Introduction to Phishing Module (Downloads .pptx)
Social Media Awareness and Security
Hackers have been known to target individuals through social media. Learn the different attack vectors, what they are after, and best practices for social media security and privacy.
Social Media Security video playlist!
Improving your Social Media Security video playlist!
Social Media Security Introduction and Best Practices Module (Downloads .pptx)
Social Media Security Threats Module (Downloads .pptx)
Secure Remote Working
Learning and working remotely have become a big part of our lives. Learn about the tools and best practices to work remotely in a secure way for both your professional and personal lives.
Secure Remote Working video playlist!
Secure Remote Working Best Practices Module (Downloads .pptx)
Web Browser Security
In this three part module, you will learn about web browser security, and learn how to secure your current browser on both computers and mobile devices.
Watch the Web Browser Security and Privacy video!
Watch the Web Browser Security and Privacy for Mobile video!
Watch our Increasing Web Browser Security Playlist!
Mobile Security
Explore how to protect your mobile devices with this module. We will explore different applications, device settings, and general best practices to keep you safe.
Mobile Security video playlist!
Internet of Things (IoT) Device Security
Learn about various Internet of Things devices, and the best practices to secure them.
IoT Device Types (Downloads .pptx)
Spyware and Malware
Explore the different kinds of malware, including ransomware and spyware. It will also give you an overview of how to identify if your device has been infected, how to clean your device with antivirus software.
Video on Spyware and Malware!
Encryption
Discover what encryption is, common types of encryption, and best practices for protecting your data. This module also includes information on password protecting, encrypting and redacting documents.
Encryption Module (Downloads .pptx)
Secure Online Shopping and Payments
Discover how financial information is secured when using the internet. You will also learn about online banking, credit card best practices, mobile payment applications, doing taxes online, and more!
Cyber Security for Journalism Professionals
Learn about social media security, geotagging, spyware, social engineering, and more.
Click the links below learn the most important things every journalist should know about cyber security. Once complete, scroll down a bit lower to see more in depth modules about a variety of cyber security topics.
Introduction to cybersecurity for journalists (Downloads .pptx)
Introduction to cybersecurity threats faced by journalists (Downloads .pptx)
Journalism Cyber Security Videos.
Each section below will contain a modules for you to complete, as well as an checklist to ensure that you have implemented the contents of the module, and checked your understanding.
Why Would Someone Hack Me?
Learn about why you are an attractive target for hacking attempts. In this module, you will explore hacker motivations, what your information is worth, and best practices to protect yourself.
Check out our "Why Would Someone Hack Me?" video playlist!
"Why Would Someone Hack Me?" Module (Downloads .pptx)
"Why Would Someone Hack Me?" Activity Sheet (Downloads .docx)
Being the Victim of a Hack
Learn about what to do if you are hacked. This module will also inform you about common hacking attacks.
Check out the Being a Victim of a Hack video playlist!
Being the Victim of a Hack Module (Downloads .pptx)
Password Security
Learn what password security is, how to improve your passwords and what a password manager is. This module will also show you how to check if your passwords have been compromised.
Check out our password security video playlist!
Phishing
Discover the different types of phishing attacks, ways to identify a phishing attempt, examine real phishing examples and learn what to do if you click on a link in a phishing email.
Access our Phishing video playlist!
Introduction to Phishing Module (Downloads .pptx)
Social Media Awareness and Security
Hackers have been known to target individuals through social media. Learn the different attack vectors, what they are after, and best practices for social media security and privacy.
View the Social Media Security video playlist!
View the Improving your Social Media Security video playlist!
Social Media Security Introduction and Best Practices Module (Downloads .pptx)
Social Media Security Threats Module (Downloads .pptx)
Secure Remote Working
Learning and working remotely have become a big part of our lives. Learn about the tools and best practices to work remotely in a secure way for both your professional and personal lives.
View out Secure Remote Working video playlist!
Secure Remote Working Best Practices Module (Downloads .pptx)
Web Browser Security
In this three part module, you will learn about web browser security, and learn how to secure your current browser on both computers and mobile devices.
Watch the Web Browser Security and Privacy video!
Watch the Web Browser Security and Privacy for Mobile video!
Watch our Increasing Web Browser Security Playlist!
Web Browser Security Module (Downloads .pptx)
Web Browser Security Activity Sheet (Downloads .docx)
Mobile Security
Explore how to protect your mobile devices with this module. We will explore different applications, device settings, and general best practices to keep you safe.
Mobile Security video playlist!
Internet of Things (IoT) Device Security
Learn about various Internet of Things devices, and the best practices to secure them.
Watch our IoT Security video!
IoT Device Types (Downloads .pptx)
Spyware and Malware
Explore the different kinds of malware, including ransomware and spyware. It will also give you an overview of how to identify if your device has been infected, how to clean your device with antivirus software.
Encryption
Discover what encryption is, common types of encryption, and best practices for protecting your data. This module also includes information on password protecting, encrypting and redacting documents.
Encryption Module (Downloads .pptx)
Secure Online Shopping and Payments
Discover how financial information is secured when using the internet. You will also learn about online banking, credit card best practices, mobile payment applications, doing taxes online, and more!
Why Would Someone Hack Me?
Learn about why you are an attractive target for hacking attempts. In this module, you will explore hacker motivations, what your information is worth, and best practices to protect yourself.
Check out our "Why Would Someone Hack Me?" video playlist!
"Why Would Someone Hack Me?" Module (Downloads .pptx)
"Why Would Someone Hack Me?" Activity Sheet (Downloads .docx)
Being the Victim of a Hack
Learn about what to do if you are hacked. This module will also inform you about common hacking attacks.
Check out the Being a Victim of a Hack video playlist!
Being the Victim of a Hack Module (Downloads .pptx)
Password Security
Learn what password security is, how to improve your passwords and what a password manager is. This module will also show you how to check if your passwords have been compromised.
Check out our password security video playlist!
Phishing
Discover the different types of phishing attacks, ways to identify a phishing attempt, examine real phishing examples and learn what to do if you click on a link in a phishing email.
Access our Phishing video playlist!
Introduction to Phishing Module (Downloads .pptx)
Social Media Awareness and Security
Hackers have been known to target individuals through social media. Learn the different attack vectors, what they are after, and best practices for social media security and privacy.
View the Social Media Security video playlist!
View the Improving your Social Media Security video playlist!
Social Media Security Introduction and Best Practices Module (Downloads .pptx)
Social Media Security Threats Module (Downloads .pptx)
Secure Remote Working
Learning and working remotely have become a big part of our lives. Learn about the tools and best practices to work remotely in a secure way for both your professional and personal lives.
View out Secure Remote Working video playlist!
Secure Remote Working Best Practices Module (Downloads .pptx)
Web Browser Security
In this three part module, you will learn about web browser security, and learn how to secure your current browser on both computers and mobile devices.
Watch the Web Browser Security and Privacy video!
Watch the Web Browser Security and Privacy for Mobile video!
Watch our Increasing Web Browser Security Playlist!
Mobile Security
Explore how to protect your mobile devices with this module. We will explore different applications, device settings, and general best practices to keep you safe.
Check out the Mobile Security video playlist!
Internet of Things (IoT) Device Security
Learn about various Internet of Things devices, and the best practices to secure them.
IoT Device Types (Downloads .pptx)
Spyware and Malware
Explore the different kinds of malware, including ransomware and spyware. It will also give you an overview of how to identify if your device has been infected, how to clean your device with antivirus software.
Video on Spyware and Malware!
Encryption
Discover what encryption is, common types of encryption, and best practices for protecting your data. This module also includes information on password protecting, encrypting and redacting documents.
Encryption Module (Downloads .pptx)
Secure Online Shopping and Payments
Discover how financial information is secured when using the internet. You will also learn about online banking, credit card best practices, mobile payment applications, doing taxes online, and more!
About CIRA
- CIRA is the Canadian Internet Registration Authority, a member-based not-for-profit best known for its management and stewardship of the .CA domain on behalf of all Canadians.
- CIRA’s Community Investment Program supports initiatives that build a trusted internet for Canadians.
- CIRA is contributing to a safer, more secure and reliable Canadian internet by maintaining a trusted .CA domain, by developing new products and services that directly strengthen the Canadian internet and by giving back to the internet community in Canada.
- CIRA is actively building a stronger internet in Canada by funding projects with charities, not-for-profits and the academic community that are doing good things for and through the Canadian internet.
- Digital technologies offer important opportunities for the non-profit sector in Canada and project funding from CIRA helps organizations innovate.
- Revenue from the registrations and renewals of .CA domains support CIRA’s Community Investment Program.
To learn more about CIRA, please see their website.
Contact Us!
Lucas Robinson
Academic Integration Specialist
lucas.robinson [at] mohawkcollege.ca (lucas[dot]robinson[at]mohawkcollege[dot]ca)