- Module Two: Cyber security Fundamentals- What is Cyberspace? -What is Cyber security?- Why is Cyber security Important? What is a Hacker?- 117 -- Case Study Module Two: Review Questions- Types of Malware, Worms, Viruses, Spyware, Trojans- Cyber Security Breaches, Phishing, Identity Theft- Harassment, Cyber stalking, Types of Cyber Attacks- Password Attacks, Denial of Service Attacks- Passive Attack, Penetration Testing Prevention Tips- Craft a Strong Password, Two‐Step Verification- Download Attachments with Care, Question Legitimacy of Websites Mobile Protection- No Credit Card Numbers, Place Lock on Phone- Don’t Save Passwords, No Personalized Contacts Listed- Social Network Security, Don’t Reveal Location- Keep Birth date Hidden, Have Private Profile- Don’t Link Accounts, Prevention Software- Firewalls, Virtual Private Networks, Anti‐Virus & Anti‐Spyware, Routine Updates- Critical Cyber Threats, Critical Cyber Threats- Cyber terrorism , Cyberwarfare, CyberespionageDefense Against Hackers- Cryptography, Digital Forensics, Intrusion Detection, Legal Recourse- Wrapping Up, Words from the Wise, Review of Parking Lot, Lessons Learned- Completion of Action Plans and Evaluations