Duration
3 weeksWeekly study
2 hours
Cyber Security Foundations: Why Cyber Security is Important
Gain an introduction to cyber security
This 3-week course for beginners will highlight the importance of cyber security in the current landscape. It will be particularly useful for IT professionals.
Cyber attacks cost a huge amount of money annually, and this figure is on the rise. According to sources, the cost of cybercrime for 2021 will rise to $6 trillion, double the estimated figure for 2015. By 2025, this is predicted to rise to $10.5 trillion.
On this course, you’ll learn about common types of cyber attacks, including phishing, viruses, and social engineering attacks, and how you can protect against them. You’ll also learn how to build a safe password policy, build in ransomware protection, and best practices for mobile data security.
Explore common cyber attacks and how to protect against them
To understand why cyber security is important, we must understand the risks we face.
This cyber security training course will introduce you to some common and dangerous cyber attacks, and key topics such as:
- how to build a good password policy and how using a password manager increases data security
- risks associated with using unknown USB drives, including USB “rubber ducky” password stealers
- how to defend against viruses, including ransomware protection, and what to do when infected
- cyber security risks associated with social media, including social engineering attacks
- how to identify spear phishing and phishing emails
- best practices for mobile data security, including VPNs and DNS redirects
- disaster recovery and how to prepare for worst-case scenarios
Completing this introduction to cyber security will enable you to take the first key steps to protecting your data. With these cyber security basics, you can prevent sensitive information getting into the wrong hands.
Syllabus
Week 1
What Are the First Steps in Protecting My Data?
Learning Together on FutureLearn
We'll introduce you to the features of the FutureLearn platform and how social learning works.
Welcome to the Course
In this activity, you will be introduced to your educator and learn what to expect in the coming week.
Physical Security: Part 1
In this activity, you will learn why good physical security is essential for cybersecurity and explore some methods to increase security in different spaces.
Physical Security: Part 2
In this activity, you will explore some methods to increase the physical security of your hardware.
Best Practices: Passwords
In this activity, learn about cybersecurity best practices to ensure that you are consistently protected.
Best Practices: Updates
In this activity, learn about cybersecurity best practices to ensure that you are consistently protected.
Week 2
How to Address Suspicious Internet Activity
Welcome to Week 2
In the following step, you will find out what is in store for the week to come.
How Vulnerable are Our Social Media Accounts?
In this activity, explore what data you may be unknowingly sharing with potential hackers.
Internet Security: Part 1
In this activity, you will learn how to assess the safety of websites and downloaded files.
Internet Security: Part 2
In this activity, you will learn how to safely browse the internet with browser plugins.
Data Backup and Disaster Recovery
In this activity, you will understand the importance of backups and how to implement a backup method system that works for you.
Week 3
How to Secure Myself, My Data and My Company
The Final Week Ahead
In this activity, find out what is in store for your final week in the course.
Securing Email Communication
In this activity, you will learn how to secure your email communication.
Securing Mobile Devices
In this activity, find out how to secure your mobile devices.
Securing the Cloud
In this activity, find out how to secure the cloud.
Securing Network Connections
In this activity, learn how to secure your network connections.
Summary
In this activity, reflect and test yourself on what you have learned during this course.
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Explore how malicious hackers can turn your social media against you
- Identify phishing emails and bad links
- Discuss how to prevent and recover from virus and ransomware attacks
- Explore how to harden your OS by patching and best practices
- Evaluate how to protect your data
Who is the course for?
This cyber security training is aimed at beginners to cyber security and IT professionals who want to understand how to protect their organization from cyber attacks.
This might include data administrators, those working with sensitive data, or those targeting a career in cyber security.
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn