Cyber-security Awareness & Fundamentals
- Description
- Curriculum
- FAQ
- Reviews
- Grade
This course provides a practical and engaging introduction to cybersecurity for everyday users, students, and professionals. You’ll learn how to protect your personal and organizational data from common threats like malware, phishing, and social engineering. The course covers digital hygiene, incident response, data protection laws, and ethical behavior online. Whether you’re working in an office, running a small business, or simply using the internet at home, this course will empower you to stay safe in the digital world.
-
1What is cybersecurity?
This lesson introduces the concept of cybersecurity, why it matters in today’s digital world, and how individuals and organizations can use it to protect data, systems, and devices. Learners will understand key terminology and real-life scenarios where cybersecurity plays a critical role.
-
2What is cybersecurity?This quiz is designed to assess your understanding of the basic concepts introduced in the lesson. It covers what cybersecurity is, why it is important in today’s digital world, and the various digital assets it aims to protect, such as data, devices, and networks. The quiz will also test your ability to recognize who is responsible for cybersecurity—whether it's individuals, companies, or governments—and identify common threats like phishing or malware. By completing this quiz, you will reinforce your foundational knowledge and be better prepared to apply safe digital practices in real-life scenarios.
-
3Importance of cybersecurity in the digital age
This lesson explores why cybersecurity is more important now than ever before. In a world where digital communication, banking, shopping, education, and even healthcare depend on connected systems, the threat landscape is growing rapidly. Learners will discover how cybersecurity underpins trust, safety, and privacy in the digital age, with practical examples from daily life, workplaces, and national security concerns.
-
4Importance of cybersecurity in the digital ageThis quiz evaluates your understanding of why cybersecurity is critically important in today’s digital world. It focuses on the growing reliance on digital services, the consequences of cyberattacks at personal, business, and national levels, and how cybersecurity helps protect sensitive information and maintain trust. By taking this quiz, you will reflect on real-life applications and develop awareness of the serious impact that cybersecurity—or its absence—can have on society.
-
5Types of data that need protection
This lesson focuses on the various types of data that are valuable in the digital world and why each type needs protection. Learners will explore personal, business, financial, and classified data, and understand how cybercriminals exploit this information if not properly secured.
-
6Types of data that need protectionThis quiz tests your understanding of the different types of sensitive data and why they require protection. You will be assessed on your ability to identify examples of PII, financial data, health records, and login credentials, and understand the risks of poor data protection. Completing this quiz will help you think critically about the types of information you handle and how to safeguard them in your daily digital activities.
-
7Malware (viruses, ransomware, spyware)
This lesson introduces learners to malware—malicious software designed to harm, exploit, or disable computers, networks, and users. We will explore different types of malware, including viruses, ransomware, and spyware, and how they work to compromise security. Real-life examples and protective measures will help learners recognize and respond to these threats.
-
8Malware (viruses, ransomware, spyware)This quiz will test your ability to identify and differentiate between common types of malware, recognize how they work, and understand ways to prevent infection. The goal is to ensure that learners are aware of how malware operates and how to stay safe in both personal and professional settings.
-
9Phishing and social engineering
This lesson introduces learners to phishing and social engineering two of the most common and deceptive forms of cyberattacks. These methods rely on human error rather than technical flaws, tricking individuals into revealing confidential information like passwords or financial data. Learners will explore how to recognize and avoid falling victim to these manipulative tactics.
-
10Phishing and social engineeringThis quiz evaluates your ability to identify phishing attempts, understand different types of social engineering, and recognize red flags in digital communications. It also assesses your knowledge of safe practices to avoid falling victim to deceptive schemes, both online and offline.
-
11Denial of Service (DoS) attacks
This lesson explains what a Denial of Service (DoS) attack is, how it works, and why it can disrupt businesses, websites, and services. Learners will understand how attackers overwhelm a system to make it unavailable to legitimate users, the difference between DoS and DDoS, and practical examples including real-world cases in Africa.
-
12Denial of Service (DoS) attacksThis quiz will assess your understanding of what a DoS and DDoS attack is, how it functions, the types of systems targeted, and the consequences of such attacks. You will also be tested on preventative measures and how to differentiate between a regular system failure and an intentional attack.
-
13Insider threats
This lesson explores insider threats—cybersecurity risks that come from within an organization. These threats are posed by employees, contractors, or other trusted individuals who have access to sensitive systems or data. Learners will understand the different types of insider threats, how they happen, and how to detect and prevent them.
-
14Insider threatsThis quiz will assess your understanding of what insider threats are, the different types, how they occur, and how organizations can prevent them. The goal is to help you recognize that people inside an organization can pose serious cybersecurity risks whether intentionally or not.
-
15Creating strong passwords & using password managers
Passwords are the first line of defense in protecting your digital identity. This lesson teaches learners how to create strong, secure passwords and introduces the use of password managers to help store and manage complex passwords safely. You’ll learn what makes a good password and how to avoid common mistakes that leave accounts vulnerable to attack.
-
16Creating strong passwords & using password managersThis quiz will test your understanding of what makes a password strong, why password security is essential, and how password managers can help. It will also assess your ability to identify weak passwords and adopt best practices for digital safety.
-
17Updating software and antivirus protection
This lesson explains the importance of keeping your software and antivirus programs up to date. Outdated systems are one of the most common entry points for cybercriminals. Learners will understand how updates close security gaps, and how antivirus software acts as a frontline defense against digital threats.
-
18Updating software and antivirus protectionThis quiz tests your understanding of the importance of software and antivirus updates, how they help protect against cyber threats, and best practices for managing your device’s security settings. You’ll be asked to identify vulnerabilities, recognize risks of outdated systems, and apply update strategies.
-
19Safe browsing and social media use
The internet is a powerful tool—but also a risky place if used carelessly. This lesson teaches learners how to browse safely and protect themselves on social media platforms. You’ll learn how cybercriminals use fake websites, malicious links, and personal information shared online to carry out attacks—and how to avoid these traps.
-
20Safe browsing and social media useThis quiz tests your knowledge of best practices for browsing safely and protecting your identity on social media. It will help you recognize risky behaviors, identify safe websites, and implement privacy and security measures in your digital life.
-
21Safe browsing and social media use
-
22What to do when an attack happens
Even with the best precautions, cyberattacks can still happen. This lesson prepares learners to respond calmly and effectively during or after a cybersecurity incident. You'll learn the first steps to take, who to inform, and how to minimize damage, whether it’s a virus infection, data breach, or social media hack.
-
23What to do when an attack happensThis quiz will assess your ability to recall the correct steps to take during a cybersecurity incident, including actions to avoid, who to inform, and how to contain the threat. It will also test your understanding of proactive planning and the importance of timely reporting.
-
24Reporting mechanisms
Prompt and proper reporting of a cyberattack or security breach is critical for protecting yourself, your organization, and others. This lesson teaches learners how, where, and when to report cybersecurity incidents, and highlights official mechanisms in Botswana and globally.
-
25Reporting mechanismsThis quiz assesses your understanding of when and where to report a cyber incident, what information should be included in a report, and how reporting helps reduce the impact of cyberattacks. It also reinforces knowledge of local reporting bodies such as BOCRA and organizational procedures.
-
26Incident response basics
Incident response is the organized approach an individual or organization takes to address and manage the aftermath of a cybersecurity incident. This lesson introduces learners to the core phases of incident response, how to build a basic plan, and the importance of preparation, coordination, and communication during a cyber crisis.
-
27Incident response basicsThis quiz assesses your knowledge of the incident response lifecycle, including the steps involved, how to handle different phases, and why each is essential. You’ll also be tested on key components of a basic incident response plan and its value in real-world situations.
-
28Introduction to data protection laws (e.g. Botswana Data Protection Act)
In today's digital world, protecting personal data is not just good practice—it's the law. This lesson introduces learners to data protection regulations, focusing on Botswana’s Data Protection Act. You'll learn why these laws exist, what your rights and responsibilities are, and how organizations must comply when handling personal information.
-
29Introduction to data protection laws (e.g. Botswana Data Protection Act)This quiz assesses your understanding of data protection laws, particularly the Botswana Data Protection Act. It will test your ability to identify key principles like consent, purpose limitation, and data security, and reinforce why these laws matter for individuals and businesses alike.
-
30Cybersecurity ethics
Cybersecurity isn’t only about technology—it’s also about responsibility. This lesson introduces learners to cybersecurity ethics, including the moral principles that guide responsible behavior online. Whether you’re a tech professional, student, or everyday user, understanding what’s right and wrong in digital spaces is key to building trust and protecting others.
-
31Cybersecurity ethicsThis quiz tests your understanding of the moral values and ethical standards expected in cybersecurity practices. You will assess situations that require ethical decision-making and evaluate actions based on principles such as integrity, confidentiality, and respect.
-
32Workplace compliance and user responsibilities
Cybersecurity in the workplace is not just the job of the IT department—every employee and user has a role to play. This lesson focuses on the responsibilities of staff in maintaining security, the importance of following organizational policies, and how to build a culture of compliance to prevent breaches, fines, or reputational damage.
-
33Workplace compliance and user responsibilitiesThis quiz evaluates your understanding of employee responsibilities in cybersecurity, key workplace compliance rules, and the importance of following security protocols. You’ll also reflect on how individual actions can impact an organization’s digital safety.