Investigate cybersecurity protocol and procedures, and examine the challenges faced when trying to protect online environments.
Duration
4 weeksWeekly study
2 hours
Cybercrime Prevention and Protection
Other courses you might like
This course isn't running right now. We can email you when it starts again, or check out these other courses you might like.
Browse more in IT & Computer Science
Explore the fundamentals of cybercrime, hacking, and network security
Over recent years, the number of online services for business and individual use has exploded and so too has the rate of cybercrime.
On this four-week course from the University of Liverpool, you’ll investigate how cybercrime has evolved in the online landscape and identify the types of cyberattacks. You’ll then assess what can be done to protect yourself across online environments.
Discover the role of an ethical hacker
The internet allows users from all over the world to connect, but this also opens us up to attacks.
You’ll explore the types of hackers, learning why they hack, and discovering how ethical hackers use hacking techniques to protect, rather than attack.
You’ll also examine the vulnerability management lifecycle and learn how to conduct vulnerability assessments; a vital, and underused, asset in organisational security procedure.
Learn the common attack vectors of wireless and mobile networks
Mobile devices and wireless networks are the most common way that users engage with the online environment so it’s vital to focus cybercrime prevention efforts in these areas.
Examining wireless local area networks (WLANs) you’ll use this knowledge to identify threats specific to wireless networks and the approaches needed when addressing mobile security.
Identify security issues for emerging technologies
As new and emerging technologies continue to advance online services, our understanding of cyber security must continue to evolve.
You’ll explore the implementation of services using the Internet of Things and 5G technology, identifying the potential vulnerabilities of new apps and services.
By the end of this course, you’ll understand cybersecurity measures used by individuals and organisations and be able to secure your networks and prevent attacks.
Syllabus
Week 1
Cybercrime and the challenges for cybercrime prevention
Introduction
An introduction to Week 1 of Cybercrime Prevention and Protection.
What is Cybercrime?
In this activity, we consider what cybercrime is, and what cybercriminals do.
Types of Cybercrime
In this activity, we explore the different types of cybercrime.
Challenges of Protecting From Cybercrime
In this activity, we examine the technical, legal and operational challenges of protecting from cybercrime.
Conclusion
We conclude Week 1 with a discussion, a summary and a look ahead to Week 2.
Week 2
Fighting Cybercrime, Penetration Testing and Ethical Hacking
Introduction
An introduction to Week 2 of Cybercrime Prevention and Protection.
Fighting Cybercrime
In this activity, we look at how to fight cybercrime, including the use of encryption, digital evidence, and computer forensics.
What is a Hacker?
In this activity, we examine the background of hackers, why they hack, and the types of hackers.
Vulnerability Management Lifecycle
In this activity, we explore the vulnerability management lifecycle, an integral part of the security procedures of an organisation.
Penetration Testing and Ethical Hacking
In this activity, we consider ethical hacking and penetration testing.
Conclusion
We conclude Week 2 with a case study, a summary and a look ahead to Week 3.
Week 3
Wireless Networks and Mobile Devices
Introduction
An introduction to Week 3 of Cybercrime Prevention and Protection.
The internet
In this activity, find out more about how different networks communicate through wired and wireless connections.
Protecting Wireless (WIFI) networks
In this activity, we explore the specific realm of wireless networks and look at possible points of attack on them.
Protecting Mobile Devices
In this activity, we identify specific attack vectors for smartphones and how to protect from these.
Conclusion
We conclude Week 3 with a case study, a summary and a look ahead to Week 4.
Week 4
Emerging Environments: The Internet of Things and 5G Technology
Introduction
An introduction to Week 4 of Cybercrime Prevention and Protection.
Protecting the Smart Home
In this activity, we examine the integration of IoT technology. IoT enables the automation of routine operations and maintenance in the home, but with it comes new risks and points of attack.
Emerging technology: 5G
In this activity, we look at the emerging technology, 5G. We will consider what 5G is, its functional architecture.
5G: Security, threats and challenges
In this activity, we will look at potential security threats and challenges for 5G.
Conclusion
We conclude Week 4 with a case study, a summary and a look ahead to possible next steps.
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Identify the definitions of different types of cybercrime and their consequences
- Understand the challenges posed by cybercrime prevention
- Identify a range of established approaches to Ethical Hacking, Penetration Testing and Vulnerability Assessment
- Develop a comprehensive understanding of Wireless Networks, Mobile Devices, Internet of Things ecosystems, and 5G technology
- Articulate the need for the use of specific methodologies for implementing security in Wireless Networks, Mobile Devices, Internet of Things ecosystems and 5G technology
Who is the course for?
This course is designed for those who want to further their understanding of internet security challenges, whether in a personal or professional capacity.
It’s particularly suitable for anyone considering a future career in cybersecurity, who wants to understand current risks, threats and responses.
This course would also be beneficial to those interested in how to take practical measures to secure their work or home environment, both on wireless or mobile networks.
Who will you learn with?
Senior Lecturer and Director of Online Learning at the Department of Computer Science, University of Liverpool, UK
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn
Learner reviews
Learner reviews cannot be loaded due to your cookie settings. Please and refresh the page to view this content.
Get a taste of this course
Find out what this course is like by previewing some of the course steps before you join:
Do you know someone who'd love this course? Tell them about it...
You can use the hashtag #FLCybercrime to talk about this course on social media.