• raspberry pi
  • National Centre for Computing Education logo

Introduction to Cybersecurity for Teachers

Explore key concepts of cybersecurity to teach 14-16 year-old students with this online cybersecurity course supported by Google.

6,599 enrolled on this course

Introduction to Cybersecurity for Teachers
The CPD Certification Service

This course has been certified by the CPD Certification Service as conforming to continuing professional development principles. Find out more.

Improve your students' knowledge of computer security

Teaching cybersecurity in schools is an important way to help students stay safe while using technology. On this course, teachers will be introduced to the core ideas of cybersecurity that should be taught in the classroom.

You will learn the different attacks that individuals and devices are vulnerable to and how to prevent them. You will explore malware, malicious bots, SQL injections, and physical threats to data. You will also build your knowledge of the different tools that protect data and websites. These include strong passwords, biometrics, two-factor authentication, and firewalls.

Download video: standard or HD

Skip to 0 minutes and 2 seconds How strong is your email password? What’s the best defence against malware? What are the telltale signs of a phishing scam? How does a firewall work? This course will introduce you to the core principles of cybersecurity and how to protect yourself against cyberattacks. This free course contains peer-led discussions, trainer interaction, and feedback on your knowledge as you progress. You can learn whenever and wherever you want. You’ll investigate elements of cybersecurity from the GCSE computing syllabus.

Skip to 0 minutes and 35 seconds So whether you’re a teacher with students of your own or simply curious about how to protect your digital self, this course will help you gain an understanding of the different ways that attackers may try to access your devices and data as well as how you can prepare your defences. Sign up now at rpf.io/cybersecurity.

Syllabus

  • Week 1

    Protecting yourself

    • Welcome to the course

      An introduction to the course, and a chance to meet the course educators and your fellow learners

    • Social Engineering

      An introduction to social engineering attacks, including phishing and shouldering attacks.

    • Device Security

      How can you help keep your devices secure?

    • Legal Solutions

      How have new laws been created to attempt to deal with cyberattacks?

  • Week 2

    Malicious Programs

    • Malware

      What types of malware are used to attack our systems?

    • Protecting programs

      Using anti-virus software, good software design and patching to avoid vulnerabilities

    • Bots

      What are bots, and why are they a problem?

  • Week 3

    Network Security

    • Welcome to Week 3

      Welcome to Week 3

    • Physical Security

      Why is physical security important when protecting networks?

    • Network Controls and Firewalls

      What are the roles of network controls and firewalls in protecting a network?

    • Peer Review Assignment

      Test your understanding by creating a learning resource, and reviewing those created by your peers.

    • End of Course

      What are the key security principles you've learned over this course?

Who is this accredited by?

The CPD Certification Service
The CPD Certification Service:

The CPD Certification Service was established in 1996 and is the leading independent CPD accreditation institution operating across industry sectors to complement the CPD policies of professional and academic bodies.

When would you like to start?

Start straight away and learn at your own pace. If the course hasn’t started yet you’ll see the future date listed below.

  • Available now

What will you achieve?

By the end of the course, you‘ll be able to...

  • Explain the meanings of terms describing common cyberattacks, such as phishing, pharming, shoulder surfing and blagging
  • Evaluate the strength of a password
  • Explain the protections offered to users by the Misuse of Computer Act
  • Describe different types of cyber attack, such as an “SQL injection attack”, and how these can be protected against or mitigated
  • Classify different types of malware
  • Explain how “anti-virus” software works

Who is the course for?

This course is designed for teachers delivering cybersecurity lessons in the classroom, at a GCSE level or equivalent.

Who will you learn with?

Hey, my name is Mac. I am a Learning Manager at The Raspberry Pi Foundation. I love teaching and digital making, especially when I get to do them both at the same time.

Who developed the course?

Raspberry Pi Foundation

The Raspberry Pi Foundation works to put the power of digital making into the hands of people all over the world, so they are capable of understanding and shaping our increasingly digital world.

National Centre for Computing Education

National Centre for Computing Education courses

Supporters

supported by

Google logo

Learner reviews

Join this course

Start this course for free, upgrade for extra benefits, or buy Unlimited to access this course and hundreds of other short courses for a year.

Free
$0

Join free and you will get:

  • Access to this course for 5 weeks

Upgrade
$44

Upgrade this course and you will get:

  • Access to this course for as long as it’s on FutureLearn
  • A print and digital Certificate of Achievement once you’re eligible

Unlimited (New!)
$279.99 for one year

Buy Unlimited and you will get:

  • Access to this course, and hundreds of other FutureLearn short courses and tests for a year
  • A printable digital Certificate of Achievement on all short courses once you’re eligible
  • The freedom to keep access to any course you've achieved a digital Certificate of Achievement on, for as long as the course exists on FutureLearn
  • The flexibility to complete your choice of short courses in your own time within the year
Find out more about upgrades or Unlimited.