Introduction & Module 1
Personal Information

This module asks young people to explore some of the ways cyber criminals use personal data to commit crime.

Read More

Module 2
Business Data

How do businesses protect the valuable information they hold about us?

Read More

Module 3
Cyber Psychology

This module introduces the growing field of study of cyber psychology: a branch of psychology focused on how thought and behaviour are affected by technology and the internet.

Read More

Module 4
Social Engineering

Social engineering uses human nature and psychology to manipulate users.

Read More

Module 5
Malware

Exploring the origin of the Trojan horse story and cyber Trojans will invite the young people to heed the importance of caution and the danger of bringing the gift inside the gates.

Read More

Module 6
Encryption

Encryption has been used throughout history to disguise messages and allow secret communcation.

Read More

Module 7
Privacy

Someone needs to pay for the internet to operate and so if you’re not a paying customer, it’s safe to assume you’re the product.

Read More

Module 8
Future is Now

The final module explores futurology or future studies; an academic discipline that uses information about the past and present to make calculated guesses about the future.

Read More