Booking options
£15
£15
On-Demand course
All levels
This online Cyber Security training course will help you to understand the potential impact of common cyber threats. It outlines safe behaviour on the Internet and also identifies what steps you can take to protect yourself and your organisation from cyber attacks.
Almost everyone spends some portion of their day online. Criminals target mobile and desktop devices and networks for illegal gains in various ways. This criminal activity, cyber-crime , is constantly changing and growing. This online course keeps you up to date with the latest developments in personal cyber security.
To stay safe online, you need to understand the main types of cyber-crime, how you can be targeted and what you can do to protect yourself.
Cyber security is the application of technologies, processes, and controls to protect computers and networks from potential cyber-attacks. It aims to reduce the risk of these attacks and protect against the unauthorised exploitation of computer systems.
Sound knowledge and understanding of cyber security will help protect you against malicious attacks to access, change or delete sensitive data. Cyber security is used as a tool to prevent attacks that aim to disable or tamper with a computer system's operations.
At the end of the cyber security course, you will be able to:
Recognise and understand the potential impact of common cyber threats.
Outline safe behaviour on the Internet.
Take steps to protect yourself and your organisation from cyber attacks.
The first topic introduces you to cyber security. It identifies who can be a target and who commits this type of crime. You will learn about how human behaviour creates risks and specific risks associated with the Internet of Things. Lastly, the topic explains how data protection laws affect you with respect to cyber-crime.
The second topic is about brute force attacks. You will also learn about secure passwords and how social media is used by hackers.
The third topic explains why cookies are important and what they do. It also identifies risks of allowing cookies and what you can do to minimise these risks.
Topic 4 describes four kinds of social engineering - tailgating, phishing, baiting and chat-in-the-middle. You will also learn how to protect yourself from phishing attacks.
Topic 5 describes malware - viruses, worms, Trojans, logic bombs and ransomware. It also covers ways you can defend against malware attacks.
Topic 6 explains how grayware works - For example, adware, keyloggers, bots and botnets - and how to reduce grayware on your device.
Finally, the topic explains how criminals steal identities and what they do with them. It also identifies the warning signs that indicate you may be a victim of identity theft and explains what to do if your identity is stolen.