Hacking: Common techniques hackers use to take over accounts and how to avoid being a target

Hacking: Common techniques hackers use to take over accounts and how to avoid being a target
Phishing: Explain how phishing attacks occur and how to identify fraudulent emails and messages.
Identity Theft: The consequences of identity theft and protective measures such as limiting personal information sharing