Introduction to cyber security: stay safe online
Overview
This free course, Introduction to cyber security: stay safe online, will help you to understand online security and start to protect your digital life, whether at home or work. You will learn how ...
Syllabus
- Introduction and guidance
- Introduction and guidance
- What is a badged course?
- How to get a badge
- Acknowledgements
- Week1Week 1: Threat landscape
- Introduction
- 1 Online, the new frontline
- 1.1 Talking security: the basics
- 1.2 Obtaining Sophos Threatsaurus
- 1.3 Cyber security attacks and phishing
- 1.4 Examples of high profile cyber security breaches
- 1.5 Taking stock of your information assets
- 1.6 What are your own safeguards?
- 2 Understanding current threats
- 2.1 Identifying vulnerable systems
- 2.2 How to keep up to date
- 2.3 Staying informed
- 3 Securing my digital information
- 3.1 Threats to your assets
- 4 Week 1 quiz
- 5 Summary of Week 1
- Further reading
- References
- Acknowledgements
- Week2Week 2: Authentication
- Introduction
- 1 Passwords: what are they for?
- 1.1 What happens when you enter a password?
- 1.2 Attacking passwords
- 1.3 Salt to protect
- 2 Improving password security
- 2.1 How to pick a proper password
- 2.2 Checking the strength of a password
- 2.3 Password managers
- 2.4 Installing and using a password manager
- 2.5 Alternatives to using password managers
- 3 Two-factor authentication
- 3.1 Setting up two-factor authentication
- Two-factor authentication on Google
- Two-factor authentication on Facebook
- Other two-factor authentication services
- 3.2 Other services supporting two-factor authentication
- 4 Week 2 quiz
- 5 Summary of Week 2
- Further reading
- Acknowledgements
- Week3Week 3: Malware
- Introduction
- 1 Viruses
- 1.1 Worms
- 1.2 Trojans
- 1.3 Defining terms
- 2 How malware gets into your computer
- 2.1 What is malware for?
- 2.2 Phishing
- 2.3 Trapping phishing emails
- 2.4 Spotting a phishing email
- 2.5 Emails are not the only phish
- 2.6 The role of malware in click fraud
- 2.7 Botnets
- 2.8 Confessional
- 3 Keeping yourself protected
- 3.1 Antivirus software
- 3.2 Installing antivirus software
- 3.3 Keeping your software up to date
- 3.4 End-of-life software
- 3.5 Sandboxes and code signing
- 4 Week 3 quiz
- 5 Summary of Week 3
- Further reading
- References
- Acknowledgements
- Week4Week 4: Networking and communications
- Introduction
- 1 What is the internet?
- 1.1 How data moves around the internet
- 1.2 Introducing the datagram
- 1.3 Datagrams on the move
- 1.4 Wireless networks
- 2 Is your private information really private?
- 2.1 Network security challenges
- 2.2 Encryption in wireless networking
- 2.3 Using wireless networking securely
- 3 Why we need standards on the internet
- 3.1 Introducing the TCP/IP protocols
- 3.2 The internet protocol and IP addresses
- 3.3 From numbers to names
- 3.4 The internet is not the world wide web
- 4 Week 4 quiz
- 5 Summary of Week 4
- Acknowledgements
- Week5Week 5: Cryptography
- Introduction
- 1 The secret of keeping secrets
- 1.1 Plaintext and ciphertext
- 1.2 Encryption keys
- 1.3 The key distribution problem
- 1.4 Asymmetric or public key cryptography
- 1.5 Why isn’t the internet encrypted?
- 2 Putting cryptography to use
- 2.1 Setting up a PGP email client
- 2.2 Sending signed and encrypted email
- 3 Comparing different cryptographic techniques
- 3.1 Using cryptography to prove identity
- 3.2 Digital signatures and certificates
- 3.3 Encrypted network connections
- 3.4 How secure is your browsing?
- 4 Week 5 quiz
- 5 Summary of Week 5
- Acknowledgements
- Week6Week 6: Network security
- Introduction
- 1 Firewall basics
- 1.1 Personal firewalls
- 1.2 Configuring your own firewall
- 2 VPN basics
- 2.1 Securing the tunnels
- 2.2 Security risks of VPN
- 2.3 Putting VPN to work
- 3 Intrusion detection system (IDS)
- 3.1 IDS techniques
- 3.2 Honeypots
- 4 Week 6 quiz
- 5 Summary of Week 6
- Further reading
- Acknowledgements
- Week7Week 7: When your defences fail
- Introduction
- 1 Identity theft
- 1.1 Loss of data
- 1.2 Risks of data loss
- 2 Laws and computers
- 2.1 Data Protection
- 2.2 The Investigatory Powers Act 2016 (IPA)
- 2.3 The Computer Misuse Act 1990 (CMA)
- 2.4 The Fraud Act 2006
- 2.5 Lawful Business Practice Regulations
- 2.6 Cyber security and the law
- 2.7 Cyber security in the EU
- 2.8 What laws apply in your country?
- 3 Who should you contact?
- 3.1 Getting your computer working again
- Recovering from a virus or other malware
- Recovering from accidentally deleting a file
- Recovering from a lost computer, disk or flash memory drive containing confidential data
- Recovering from an operating system failure
- 3.2 Making your information less vulnerable
- 3.3 Protecting your data for the future
- 3.4 Backup media
- 3.5 Remote backups
- 3.6 Do you backup your data?
- 3.7 Archiving data
- 4 Week 7 quiz
- 5 Summary of Week 7
- Further reading
- References
- Acknowledgements
- Week8Week 8: Managing security risks
- Introduction
- 1 Information as an asset
- 1.1 Your own information assets
- 1.2 Risk analysis
- 1.3 Risk analysis in practice
- 2 Staying safe online
- 2.1 Fix your browser
- 2.2 Risk management in practice
- 2.3 Protecting your information assets
- 2.4 What should I do next?
- 2.5 Tracking a moving target
- 3 What do you do now?
- 3.1 Confessional
- 4 End-of-course quiz
- 5 End-of-course guide and round-up
- 6 Next steps
- Tell us what you think
- Acknowledgements
Start The Class
OpenLearn
Free Online Course
English
Free Certificate Available
24 hours worth of material
On-Demand
Beginners