With increasingly sophisticated technical defenses for networks and computer systems hackers often decide that it’s much easier to simply go around these perimeter defenses by attacking the end user. After all end users have what they want – a computer that’s behind the network firewall a network username and password and possibly access to trade secrets confidential information and bank accounts. This course will teach end users how to identify and avoid giving away sensitive information to these hackers. This HTML5-based iPad-compatible course uses