Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

The Beginners Cyber Security Awareness Training Course

Packt via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Cyber threats are everywhere, and this course empowers you to spot and stop them before they cause harm. Through interactive, real-world examples, you’ll gain the skills to recognize and respond to common cyber-attacks such as phishing, ransomware, smishing, vishing, and more. This engaging course is designed to make learning cyber security not just effective—but also memorable and fun. Your journey begins with an introduction to hacking and the psychology behind social engineering. You’ll explore the anatomy of email scams, SMS-based attacks, and CEO fraud. As the course progresses, you’ll uncover browser vulnerabilities, smartphone risks, and shady search engine tricks, all presented through clear examples and practical tips. The final modules focus on security tools and strategies: password managers, two-factor authentication, encryption, and device hardening. You’ll also learn how to safeguard your privacy online and defend against identity theft and IoT threats. The course wraps up with a comprehensive security checklist and best practices for daily digital life. This course is ideal for anyone looking to protect themselves online—whether you're a working professional, student, or home user. No prior experience in cyber security is required, and the course is designed for beginners who want practical, real-world knowledge to stay safe online. By the end of the course, you will be able to identify and defend against a wide range of social engineering attacks, configure devices for optimal security, and apply strong authentication and privacy practices across your digital life.

Syllabus

  • Course Introduction
    • In this module, we will introduce you to the fundamentals of cyber security. You will meet your instructor, Reza, and get an overview of the course structure. By the end of this section, you'll understand what you can expect from this engaging and memorable cyber security awareness training.
  • How Hard Is it to Get Hacked?
    • In this module, we will explore how cyber attacks have evolved and why it is harder for hackers to breach secure systems. We’ll also discuss how hackers adapt their techniques to bypass current security measures and how you can protect yourself.
  • Targeted Email Phishing and Social Engineering
    • In this module, we will break down targeted phishing attacks and social engineering tactics, examining how attackers use deception to gain your trust. We will cover multiple examples to help you identify these threats and respond effectively.
  • Macro Malware
    • In this module, we will dive into the world of macro malware, a popular method used by hackers to infiltrate systems. You’ll learn how to spot and prevent these types of attacks by recognizing malicious macros.
  • Business Email Compromise
    • In this module, we will explore the dangers of Business Email Compromise (BEC), also known as CEO Fraud. We’ll show you how these attacks operate and teach you how to protect your organization from falling victim to these scams.
  • Smishing
    • In this module, we will examine Smishing, a type of social engineering attack conducted via SMS. You’ll learn how to spot fraudulent texts and what steps to take if you receive suspicious messages.
  • Vishing
    • In this module, we will cover Vishing, or voice phishing, where scammers impersonate trusted figures over the phone. We’ll review real-world audio examples and show you how to detect and respond to such attacks.
  • Ransomware
    • In this module, we will focus on the growing threat of ransomware, a malicious attack that locks and demands payment to restore access. We’ll discuss the latest attack methods and give you practical advice on how to stay safe.
  • Red Flags
    • In this module, we will review the key red flags in social engineering attacks. You’ll learn how scammers manipulate emotions to trick you and how to respond effectively when faced with such threats.
  • Search Engine Optimization
    • In this module, we will explore how search engines can be used to deliver malware, phishing links, and other threats. You’ll learn how to spot and avoid these attacks, and how to safely navigate search results.
  • Apple
    • In this module, we will take a deep dive into Apple’s security measures and how to leverage them to protect your Mac. You’ll also learn about common cyber-attacks targeting Apple users and how to defend against them.
  • Smartphones and Mobile Apps
    • In this module, we will examine the unique security challenges posed by smartphones and mobile apps. You’ll learn the risks associated with both iPhones and Android devices and how to protect your personal information.
  • Password Management
    • In this module, we will guide you through the best practices for managing passwords securely. You’ll learn the importance of strong password hygiene and how to store your passwords effectively across multiple devices.
  • Two-Factor Authentication
    • In this two-part module, we will explore Two-Factor Authentication (2FA) as a powerful method for securing your online accounts. You’ll learn how to set it up and why it’s a critical safeguard against cyber threats.
  • Passkeys
    • In this module, we will introduce you to Passkeys, a new and more secure method of authentication. You’ll learn how Passkeys work and why they represent the future of passwordless security.
  • Browser Security
    • In this module, we will explore common browser security risks and teach you how to secure your browser against threats like malicious extensions, tracking cookies, and harmful scripts.
  • Internet Data Privacy
    • In this module, we will delve into internet data privacy, showing how your personal information is collected and used by tech giants. You’ll learn methods to safeguard your privacy while browsing the web.
  • Identity Theft
    • In this module, we will cover the basics of identity theft, focusing on how your data can be stolen and misused. You’ll learn how to protect your credit profile and what steps to take if your information is compromised.
  • Encryption
    • In this module, we will introduce you to encryption, a fundamental tool for protecting your data. You’ll learn how encryption works and discover practical ways to encrypt your data at home and at work.
  • Internet of Things
    • In this module, we will focus on the Internet of Things (IoT) and the unique security challenges these devices bring. You’ll learn how to secure your home network and prevent hackers from exploiting connected devices.
  • What Else Can You Do to Protect Yourself?
    • In this final two-part module, we will recap the essential cyber security concepts covered in the course and provide additional tips for protecting yourself. We’ll also guide you on how to continue learning and improving your cyber security awareness.

Taught by

Packt - Course Instructors

Reviews

Start your review of The Beginners Cyber Security Awareness Training Course

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.