Identity Theft: The consequences of identity theft and protective measures such as limiting personal information sharing

Identity Theft: The consequences of identity theft and protective measures such as limiting personal information sharing
Hacking: Common techniques hackers use to take over accounts and how to avoid being a target
Phishing: Explain how phishing attacks occur and how to identify fraudulent emails and messages.