Cyber Security Awareness and Solutions
Protect yourself from cyber security attacks when using computers and smartphones as you learn how to identify threats with this practical online course.
Duration
2 weeks
Weekly study
2 hours
100% online
How it works
Unlimited subscription
Learn more
Cyber security attacks come from many different sources and can be a threat to finances, time, and reputation.
On this two-week course, you’ll explore common cyber security attacks and learn the techniques to protect yourself when using computers, smartphones, and the internet.
Through numerous visual examples, you’ll discover the ways that businesses are hacked and defrauded through malicious macros, ransomware attacks, phishing emails, and more. With this knowledge, you’ll be able to recognise the major red flags so that you can readily detect these threats in the future.
Computers are not the only device vulnerable to hacking – smartphones are also at risk.
On the course, you’ll explore social engineering attacks that use your mobile phone to trick you into paying money or giving your passwords away. You’ll discover how easily people can be preyed upon using methods such as smishing and vishing.
Next, you’ll become well-versed in the general security differences between iPhones and Androids and learn how to avoid downloading malicious apps.
To understand all the ways you can be at risk on the internet, you’ll take a deep dive into browser security and internet data privacy.
You’ll also unpack the security risk with social media, disinformation, and the threat of identity theft.
After exploring key security issues, you’ll then cover effective solutions such as 2-factor authentication for passwords and the importance of encryption.
By the end, you’ll understand how easy it can be to get hacked, and the preventative measures you can take to keep yourself and your business safe.
Welcome to Cyber Security Awareness and Solutions and the start of your learning journey, brought to you by Packt.
In this activity, we will describe what hacking is, and how easily hackers can gain access to computer systems and company networks.
In this activity, we will discuss cyberattacks executed through email, instant messaging, SMS, and by telephone.
In this activity, we will describe cyberattacks that introduce malware into computers and mobile phones.
In this activity, we will discuss other common ways that hackers use malicious links, emails, apps, and webpages to access personal and banking information.
In this activity, we will discuss the cybersecurity issues related to smartphones and Apple computers.
You have reached the end of Week 1. In this activity, you'll reflect on what you have learned.
Welcome to Week 2. In this activity we'll highlight the main topics that will be covered this week.
In this activity, we will discuss the benefits of effective password management and two-factor authentication for signing into websites, email accounts and apps.
In this activity, we will identify the main security issues related to using browsers and learn how to use browsers more securely.
In this activity, we will discuss issues around the protection of users’ data and online privacy.
In this activity, we will review the cybersecurity issues and solutions covered in this course.
You have reached the end of this course. In this activity, you will reflect on what you have learned.
More courses you might like
Learners who joined this course have also enjoyed these courses.
©2025 onlincourse.com. All rights reserved