
Duration
2 weeksWeekly study
2 hours
Cyber Security Awareness and Solutions
Explore common cyber attacks such as a phishing email
Cyber security attacks come from many different sources and can be a threat to finances, time, and reputation.
On this two-week course, you’ll explore common cyber security attacks and learn the techniques to protect yourself when using computers, smartphones, and the internet.
Through numerous visual examples, you’ll discover the ways that businesses are hacked and defrauded through malicious macros, ransomware attacks, phishing emails, and more. With this knowledge, you’ll be able to recognise the major red flags so that you can readily detect these threats in the future.
Unpack smishing and vishing
Computers are not the only device vulnerable to hacking – smartphones are also at risk.
On the course, you’ll explore social engineering attacks that use your mobile phone to trick you into paying money or giving your passwords away. You’ll discover how easily people can be preyed upon using methods such as smishing and vishing.
Next, you’ll become well-versed in the general security differences between iPhones and Androids and learn how to avoid downloading malicious apps.
Explore browser security
To understand all the ways you can be at risk on the internet, you’ll take a deep dive into browser security and internet data privacy.
You’ll also unpack the security risk with social media, disinformation, and the threat of identity theft.
Learn cyber security solutions
After exploring key security issues, you’ll then cover effective solutions such as 2-factor authentication for passwords and the importance of encryption.
By the end, you’ll understand how easy it can be to get hacked, and the preventative measures you can take to keep yourself and your business safe.
Syllabus
Week 1
Cybersecurity: types of attacks
Introduction to the course
Welcome to Cyber Security Awareness and Solutions and the start of your learning journey, brought to you by Packt.
Introduction to cybersecurity
In this activity, we will describe what hacking is, and how easily hackers can gain access to computer systems and company networks.
Phishing, smishing and vishing
In this activity, we will discuss cyberattacks executed through email, instant messaging, SMS, and by telephone.
Malware and ransomware
In this activity, we will describe cyberattacks that introduce malware into computers and mobile phones.
Other types of cyberattacks
In this activity, we will discuss other common ways that hackers use malicious links, emails, apps, and webpages to access personal and banking information.
Apple and Android security
In this activity, we will discuss the cybersecurity issues related to smartphones and Apple computers.
Wrap up
You have reached the end of Week 1. In this activity, you'll reflect on what you have learned.
Week 2
Cybersecurity: key issues and solutions
Introduction to Week 2
Welcome to Week 2. In this activity we'll highlight the main topics that will be covered this week.
Logging in safely
In this activity, we will discuss the benefits of effective password management and two-factor authentication for signing into websites, email accounts and apps.
Browsing safely
In this activity, we will identify the main security issues related to using browsers and learn how to use browsers more securely.
Protecting data
In this activity, we will discuss issues around the protection of users’ data and online privacy.
Cybersecurity solutions
In this activity, we will review the cybersecurity issues and solutions covered in this course.
Final week wrap up
You have reached the end of this course. In this activity, you will reflect on what you have learned.
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Identify the social engineering tactics used in cyberattacks.
- Discuss different types of cyberattacks and the cybersecurity issues that individuals and organisations are vulnerable to.
- Describe the cybersecurity solutions available to help detect and respond to cyberattacks.
Who is the course for?
This course is designed for anyone who wants to learn how to prevent and avoid cyber security attacks.
The content can be applied to both personal and professional contexts.
What's included?
This is a premium course. These courses are designed for professionals from specific industries looking to learn with a smaller group of like-minded individuals.
- Unlimited access to this course
- Includes any articles, videos, peer reviews and quizzes
- Certificate of Achievement to prove your success when you're eligible
- Download and print your Certificate of Achievement anytime
Still want to know more? Check out our FAQs
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn
Do you know someone who'd love this course? Tell them about it...
More courses you might like
Learners who joined this course have also enjoyed these courses.
Browse more in IT & Computer Science