Table of Contents

  1. Introduction
  2. Phishing
    1. How Phishing Works
    2. Phishing Scam
    3. How to Defend Against Phishing
    4. Phishing Quiz
  3. Identity Theft
    1. Identity Theft Quiz
  4. Hoaxes
    1. Virus Hoaxes
    2. Hoax Activity
    3. Hoax Quiz
  5. Ransomware
    1. Ransomware Quiz
  6. Hackers
    1. Internet Threats Quiz 2
  7. Cyberbullying
    1. Tackling Cyberbullying
  8. Internet Grooming
    1. How to Protect Yourself
    2. Internet Threats Quiz 3