Course Structure
Introduction
The course begins with an overview of the objectives to be achieved.
Module 1: Cyber Security Fundamentals
This module covers the basics of cybersecurity, including an introduction to cyberspace, a definition of cybersecurity, the importance of cybersecurity, and an explanation of what a hacker is. A knowledge check is included to reinforce learning.
Module 2: Types of Malware
In this module, learners will explore different types of malware, such as worms, viruses, spyware, and trojans. The session concludes with a knowledge check to assess understanding.
Module 3: Cyber Security Breaches
This module discusses various types of cybersecurity breaches, including phishing, identity theft, harassment, and cyberstalking. A knowledge check is provided at the end of the module.
Module 4: Types of Cyber Attacks
Here, the focus is on different cyber attack techniques, including password attacks, denial of service attacks, passive attacks, and penetration testing. The module includes a knowledge check for comprehension.
Module 5: Prevention Tips
This module offers practical prevention tips, such as crafting strong passwords, enabling two-step verification, handling email attachments carefully, and questioning the legitimacy of websites. A knowledge check follows the tips.
Module 6: Mobile Protection
Learners will discover strategies for protecting mobile devices, including avoiding storing credit card numbers, placing a lock on the phone, not saving passwords, and not listing personalized contacts. A knowledge check is included.
Module 7: Social Network Security
This module emphasizes social network security, advising against revealing one's location, keeping birthdates hidden, maintaining a private profile, and not linking accounts. The module concludes with a knowledge check.
Module 8: Prevention Software
The focus here is on software tools for prevention, such as firewalls, virtual private networks, antivirus, and antispyware programs, along with the importance of routine updates. A knowledge check is provided.
Module 9: Critical Cyber Threats
This module addresses significant cyber threats, including cyber terrorism, cyber warfare, and cyber espionage. It includes a knowledge check to test understanding.
Module 10: Defense Against Hackers
Learners will explore defenses against hackers, including cryptography, digital forensics, intrusion detection, and legal recourse. The module ends with a knowledge check.
Assessment
The course concludes with a post-test to evaluate the learners' comprehension and retention of the material covered.