Accreditations and Endorsements
![CPD certified](https://lpshowcase.learningpool.com/wp-content/uploads/2021/07/cpd-certified-black-150x137.png)
![](https://lpshowcase.learningpool.com/wp-content/uploads/2022/10/Crown-150x124.png)
Welcome to Audio Learning from Assemble You.
Malware is a portmanteau, a combination of the words – “malicious” and “software.” It’s malicious software that is designed to cause harm to a system. It could be simply deleting data or, even more perniciously, hiding like a spy in the system, monitoring our activities. It can capture your keystrokes and send them to the person, the hacker, who planted the malware in our system. This means that if we are entering a password somewhere, let’s say in our online bank account, that person controlling the malware also gets to know it. Almost everything is visible to the hacker: our data, confidential files, photographs… almost everything.
Sounds scary, right? It is, but that doesn’t mean we’re helpless.
In this track, we’ll go through some of the different types of malware and what you can do to protect yourself against them.
Watch Content PreviewWelcome to Audio Learning from Assemble You. Today we are discussing using and managing passwords. Your house often contains the most valuable possessions you […]
Welcome to Audio Learning from Assemble You. In his book How to Hack a Human: Cybersecurity for the Mind, security expert Raef Meeuwisse defines […]
Welcome to Audio Learning from Assemble You. In this track, we’ll discuss cultural awareness, and discover how being culturally aware enables us to communicate […]
Welcome to Audio Learning from Assemble You. In this track, we’ll discuss banter and bullying. We’ll pin down the definitions before highlighting the line […]
Welcome to Audio Learning from Assemble You. In this track, we’ll discuss unconscious and implicit bias. We’ll learn what these terms mean, how they […]
Welcome to Audio Learning from Assemble You. In this track, you’ll improve your understanding of equality, diversity, and inclusion. You’ll identify areas in which […]
Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working […]
"*" indicates required fields
Products that work beautifully on their own and seamlessly when you put them together