Course curriculum

  • 1

    Introduction

    • Introduction

    • Overview

    • Learning Objectives

  • 2

    Data-related threats

    • Data-related threats against WHDRs and WCSOs

  • 3

    Relevant responses

    • Access Control and Permissions

    • App Permissions

    • Encryption

    • Data backup

  • 4

    Summary and Quiz

    • End of Module Quiz

    • Summary