Skip to main content
UNESCO ICT CFT Based Courses UNESCO ICT CFT Based Courses
  • English ‎(en)‎
    English ‎(en)‎ العربية ‎(ar)‎
  • You are currently using guest access (Log in)
  • Online safety
  • Module 3 Unit 2
  • Introduction
  • Internet safety and cybercrime
  • Cybercrime activities
  • Phishing
  • Password security
  • Malware
  • Cyberbullying
  • Accessing illegal material
  • GEC
  • Assignment
  • Lesson plan
  • Conclusion
  • Home
  • Calendar

Online safety

  1. Home
  2. Courses
  3. Zambia (MoE)
  4. Module 3 - Implications of technology use
  5. Online safety
  6. GEC
  7. Khan Academy. (nd). Strong passwords (CC BY-NC-SA)

Khan Academy. (nd). Strong passwords (CC BY-NC-SA)

View
Click https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/strong-passwords link to open resource.
◄ Khan Academy. (nd). Cybersecurity and crime (CC BY-NC-SA)
Microsoft Support Centre. (2020). Microsoft security help and learning ►
You are currently using guest access (Log in)
Online safety
  • English ‎(en)‎
    • English ‎(en)‎
    • العربية ‎(ar)‎
Data retention summary
Get the mobile app