Course curriculum

  • 1

    Welcome to the course!

    • A message from Cheryl

    • Before we begin...

  • 2

    Let's get started!

    • Sex Toys, Wetware, and Cybersecurity...Oh My!

    • Business Decisions and Cybersecurity

    • Violation of Trust

    • How is Trust Violated?

    • Deception

    • An Internetwork of Communication

  • 3

    Next Steps...

    • Before you go...

    • More resources for you