Online course

Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks

Discover what common cyber threats and attacks face small and medium enterprises, and what you can do to prevent them.

Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks

This course is part of the program IT Security Management, which is one of the building blocks that leads to a degree in Cyber Security. Find out more.

Why join the course?

Almost daily we hear about cyber attacks on large organisations, but we rarely hear much about similar attacks on small and medium enterprises. This doesn’t mean that they’re not happening.

In this course, you’ll explore some of the common cyber threats facing small and medium enterprises, what a cyber attack means, and what practical tools and strategies you can put in place to prevent them.

Deakin University has been providing cyber security education since 2007. Our experts are active researchers and engaged in partnerships with leading industry bodies such as Dimension Data Learning Solutions, which ensures we develop our students’ real-world cyber security knowledge and skills.

Download video: standard or HD

What topics will you cover?

  • The Panama Papers, a real cyber attack
  • Cyber threats and the methods that hackers use
  • Consequences of cyber attacks for small and medium enterprises
  • Tools and preventative strategies that you can put in place to protect your organisation

When would you like to start?

Who is the course for?

This course has been designed for anyone working in small or medium enterprises or who has an interest in learning more about identifying cyber threats and preventing potential attacks. The learning covered is relevant to those both with or without an IT background.

What do people say about this course?

Thank you the team at Deakin University for this course. It really expanded my knowledge of the cyber security world.

Joshua Hunte

Who will you learn with?

Nicholas Patterson

Dr Nicholas Patterson (Ph.D) is an academic professional and Alfred Deakin Medalist in Information Technology and Criminology who has been involved in cyber-security research projects and teaching.

Lei Pan

Dr Lei Pan is an academic professional who specialized in cyber-security and digital forensics research projects and teaching.

John Yearwood

Professor John Yearwood is Head of the School of Information Technology and has set up partnerships between large IT companies, financial institutions, government and Universities on cyber security.

Keshav SOOD

Keshav Sood is passionate about IT security with specific research interests in Software-Defined Network security. Keshav has worked with the Terminal Ballistic Research Lab.

Who developed the course?

Deakin University is one of Australia’s largest universities with more than 58,000 students studying online and on-campus.

Learners collage mobile
Join this course

Free
$0

  • Access to this course for 4 weeks
  • Includes any articles, videos, peer reviews and quizzes

Upgrade
$74

  • Unlimited access to this course
  • Includes any articles, videos, peer reviews and quizzes
  • Tests to validate your learning
  • Certificate of Achievement to prove your success when you're eligible
  • Download and print your Certificate of Achievement anytime

Advance your career with a degree

What's different about this course?

Since 2017 you have been able to take a degree on FutureLearn. This free course is a bit like a starter course for a degree — it should give you a flavour of the degree subject but can also be your first step towards a degree qualification.

If you enjoy this course you can apply to join the program it’s part of to start working towards a degree on FutureLearn.

Don’t worry, you can still take the course without doing a full degree!

How do degrees work on FutureLearn?

Do the free course
Join and complete the program
Get academic credit for an online degree from Deakin University

Which program and degree is this course part of?

This course is part of the program IT Security Management, which is one of the building blocks that leads to a degree in Cyber Security.

Get a taste of this course

Find out what this course is like by previewing some of the course steps before you join: