Login

Please fill in your details to login.





module 1.11: shielding the fortress

Now that we know the threats, how do we stop them? This module covers the essential armour and weaponry used by IT professionals to protect data and secure systems.
page icon
We are diving into the lifesavers of IT: backup/recovery procedures, and the vital role of passwords and multi-factor authentication.
Last modified: March 28th, 2026
The Computing Café works best in landscape mode.
Rotate your device.
Dismiss Warning