Mohawk Cyber Security Modules

Cyber security involves protecting you, your information, devices and networks from hackers and other malicious people. When you think of cyber security, you probably think of people trying to break into highly secured companies and devices using very technical methods. In reality, a lot of attacks are done through social means, and everyone can be the target of a hacker.

These modules were made possible through funding from CIRA (the Canadian Internet Registration Authority) and their Community Investment Program, Mohawk College has been developing customized cyber security modules for Indigenous learners, journalism students and professionals, and high school students. They will take you through understanding why someone would target you, best practices to avoid being hacked, and what to do if you are compromised

To learn more about the Community Investment Program funding we received for development, see our website.

Cyber Security for Indigenous Learners

Discover best practices for working and learning from home, how to protect yourself from being hacked, the potential dangers of social media platforms and more.

Each section below will contain a modules for you to complete, as well as an checklist to ensure that you have implemented the contents of the module, and checked your understanding.

Why Would Someone Hack Me?

Learn about why you are an attractive target for hacking attempts. In this module, you will explore hacker motivations, what your information is worth, and best practices to protect yourself.

Check out our "Why Would Someone Hack Me?" video playlist!

"Why Would Someone Hack Me?" Module (Downloads .pptx)

"Why Would Someone Hack Me?" Activity Sheet (Downloads .docx)

Password Security

Learn what password security is, how to improve your passwords and what a password manager is. This module will also show you how  to check if your passwords have been compromised.

Check out our password security video playlist!

Password Security Module (Downloads .pptx)

Password Security Activity Sheet (Downloads .docx)

Phishing

Discover the different types of phishing attacks, ways to identify a phishing attempt, examine real phishing examples and learn what to do if you click on a link in a phishing email.

Click here to access our Phishing video playlist!

Introduction to Phishing Module (Downloads .pptx)

Identify Examples of Phishing Module (Downloads .pptx)

Phishing Activity Sheet (Downloads .docx)

Secure Remote Working

Learning and working remotely have become a big part of our lives. Learn about the tools and best practices to work remotely in a secure way for both your professional and personal lives.

Click here to view out Secure Remote Working video playlist!

Secure Remote Working Best Practices Module (Downloads .pptx)

Secure Remote Working Software Module (Downloads .pptx)

Secure Remote Working Activity Sheet (Downloads .docx)

Mobile Security

Explore how to protect your mobile devices with this module. We will explore different applications, device settings, and general best practices to keep you safe.

Check out the Mobile Security video playlist!

Mobile Security Module (Downloads .pptx)

Mobile Security Activity Sheet (Downloads .docx)

Internet of Things (IoT) Device Security

Learn about various Internet of Things devices, and the best practices to secure them.

Click here to watch our IoT Security video!

IoT Device Types (Downloads .pptx)

IoT Device Best Practices (Downloads .pptx)

IoT Device Activity Sheet (Downloads .docx)

Spyware and Malware

Explore the different kinds of malware, including ransomware and spyware. It will also give you an overview of how to identify if your device has been infected, how to clean your device with antivirus software.

Click here for our video on Spyware and Malware!

Spyware and Malware Module (Downloads .pptx)

Spyware and Malware Activity Sheet (Downloads .docx)

Encryption

Discover what encryption is, common types of encryption, and best practices for protecting your data. This module also includes information on password protecting, encrypting and redacting documents.

Click here for our Encryption Video Series!

Encryption Module (Downloads .pptx)

File Password Protection and Redaction (Downloads .pptx)

Encryption Activity Sheet (Downloads .docx)

Secure Online Shopping and Payments

Discover how financial information is secured when using the internet. You will also learn about online banking, credit card best practices, mobile payment applications, doing taxes online, and more!

 
 

 

Cyber Security for Journalism Professionals

Learn about social media security, geotagging, spyware, social engineering, and more.

Click the links below learn the most important things every journalist should know about cyber security. Once complete, scroll down a bit lower to see more in depth modules about a variety of cyber security topics.

Click here for the introduction to cybersecurity for journalists (Downloads .pptx)

Click here for the introduction to cybersecurity threats faced by journalists (Downloads .pptx)

Click to watch our Journalism Cyber Security Videos.

Each section below will contain a modules for you to complete, as well as an checklist to ensure that you have implemented the contents of the module, and checked your understanding.

Why Would Someone Hack Me?

Learn about why you are an attractive target for hacking attempts. In this module, you will explore hacker motivations, what your information is worth, and best practices to protect yourself.

Check out our "Why Would Someone Hack Me?" video playlist!

"Why Would Someone Hack Me?" Module (Downloads .pptx)

"Why Would Someone Hack Me?" Activity Sheet (Downloads .docx)

Password Security

Learn what password security is, how to improve your passwords and what a password manager is. This module will also show you how  to check if your passwords have been compromised.

Check out our password security video playlist!

Password Security Module (Downloads .pptx)

Password Security Activity Sheet (Downloads .docx)

Phishing

Discover the different types of phishing attacks, ways to identify a phishing attempt, examine real phishing examples and learn what to do if you click on a link in a phishing email.

Click here to access our Phishing video playlist!

Introduction to Phishing Module (Downloads .pptx)

Identify Examples of Phishing Module (Downloads .pptx)

Phishing Activity Sheet (Downloads .docx)

Secure Remote Working

Learning and working remotely have become a big part of our lives. Learn about the tools and best practices to work remotely in a secure way for both your professional and personal lives.

Click here to view out Secure Remote Working video playlist!

Secure Remote Working Best Practices Module (Downloads .pptx)

Secure Remote Working Software Module (Downloads .pptx)

Secure Remote Working Activity Sheet (Downloads .docx)

Mobile Security

Explore how to protect your mobile devices with this module. We will explore different applications, device settings, and general best practices to keep you safe.

Check out the Mobile Security video playlist!

Mobile Security Module (Downloads .pptx)

Mobile Security Activity Sheet (Downloads .docx)

Internet of Things (IoT) Device Security

Learn about various Internet of Things devices, and the best practices to secure them.

Click here to watch our IoT Security video!

IoT Device Types (Downloads .pptx)

IoT Device Best Practices (Downloads .pptx)

IoT Device Activity Sheet (Downloads .docx)

Spyware and Malware

Explore the different kinds of malware, including ransomware and spyware. It will also give you an overview of how to identify if your device has been infected, how to clean your device with antivirus software.

Click here for our video on Spyware and Malware!

Spyware and Malware Module (Downloads .pptx)

Spyware and Malware Activity Sheet (Downloads .docx)

Encryption

Discover what encryption is, common types of encryption, and best practices for protecting your data. This module also includes information on password protecting, encrypting and redacting documents.

Click here for our Encryption Video Series!

Encryption Module (Downloads .pptx)

File Password Protection and Redaction (Downloads .pptx)

Encryption Activity Sheet (Downloads .docx)

Secure Online Shopping and Payments

Discover how financial information is secured when using the internet. You will also learn about online banking, credit card best practices, mobile payment applications, doing taxes online, and more!

    Cyber Security for High School Students

    Learn about social media, public Wi-Fi, what a hacker is looking for, and more.

    Click the link below learn the most important things every high school student should know about cyber security. Once complete, scroll down a bit lower to see more in depth modules about a variety of cyber security topics.

    Check out our introduction to cyber security for high school students (Downloads .pptx)

    Each section below will contain a modules for you to complete, as well as an checklist to ensure that you have implemented the contents of the module, and checked your understanding.

    Why Would Someone Hack Me?

    Learn about why you are an attractive target for hacking attempts. In this module, you will explore hacker motivations, what your information is worth, and best practices to protect yourself.

    Check out our "Why Would Someone Hack Me?" video playlist!

    "Why Would Someone Hack Me?" Module (Downloads .pptx)

    "Why Would Someone Hack Me?" Activity Sheet (Downloads .docx)

    Password Security

    Learn what password security is, how to improve your passwords and what a password manager is. This module will also show you how  to check if your passwords have been compromised.

    Check out our password security video playlist!

    Password Security Module (Downloads .pptx)

    Password Security Activity Sheet (Downloads .docx)

    Phishing

    Discover the different types of phishing attacks, ways to identify a phishing attempt, examine real phishing examples and learn what to do if you click on a link in a phishing email.

    Click here to access our Phishing video playlist!

    Introduction to Phishing Module (Downloads .pptx)

    Identify Examples of Phishing Module (Downloads .pptx)

    Phishing Activity Sheet (Downloads .docx)

    Secure Remote Working

    Learning and working remotely have become a big part of our lives. Learn about the tools and best practices to work remotely in a secure way for both your professional and personal lives.

    Click here to view out Secure Remote Working video playlist!

    Secure Remote Working Best Practices Module (Downloads .pptx)

    Secure Remote Working Software Module (Downloads .pptx)

    Secure Remote Working Activity Sheet (Downloads .docx)

    Mobile Security

    Explore how to protect your mobile devices with this module. We will explore different applications, device settings, and general best practices to keep you safe.

    Check out the Mobile Security video playlist!

    Mobile Security Module (Downloads .pptx)

    Mobile Security Activity Sheet (Downloads .docx)

    Internet of Things (IoT) Device Security

    Learn about various Internet of Things devices, and the best practices to secure them.

    Click here to watch our IoT Security video!

    IoT Device Types (Downloads .pptx)

    IoT Device Best Practices (Downloads .pptx)

    IoT Device Activity Sheet (Downloads .docx)

    Spyware and Malware

    Explore the different kinds of malware, including ransomware and spyware. It will also give you an overview of how to identify if your device has been infected, how to clean your device with antivirus software.

    Click here for our video on Spyware and Malware!

    Spyware and Malware Module (Downloads .pptx)

    Spyware and Malware Activity Sheet (Downloads .docx)

    Encryption

    Discover what encryption is, common types of encryption, and best practices for protecting your data. This module also includes information on password protecting, encrypting and redacting documents.

    Click here for our Encryption Video Series!

    Encryption Module (Downloads .pptx)

    File Password Protection and Redaction (Downloads .pptx)

    Encryption Activity Sheet (Downloads .docx)

    Secure Online Shopping and Payments

    Discover how financial information is secured when using the internet. You will also learn about online banking, credit card best practices, mobile payment applications, doing taxes online, and more!


    CIRA logo

    About CIRA

    • CIRA is the Canadian Internet Registration Authority, a member-based not-for-profit best known for its management and stewardship of the .CA domain on behalf of all Canadians.
    • CIRA’s Community Investment Program supports initiatives that build a trusted internet for Canadians.
    • CIRA is contributing to a safer, more secure and reliable Canadian internet by maintaining a trusted .CA domain, by developing new products and services that directly strengthen the Canadian internet and by giving back to the internet community in Canada.
    • CIRA is actively building a stronger internet in Canada by funding projects with charities, not-for-profits and the academic community that are doing good things for and through the Canadian internet.
    • Digital technologies offer important opportunities for the non-profit sector in Canada and project funding from CIRA helps organizations innovate.
    • Revenue from the registrations and renewals of .CA domains support CIRA’s Community Investment Program.

    To learn more about CIRA, please see their website.

    Contact Us!

    Lucas Robinson

    Academic Integration Specialist

    lucas.robinson [at] mohawkcollege.ca