We may earn an affiliate commission when you visit our partners.
Course image
Course image
FutureLearn logo

Introduction to Cybersecurity for Teachers

Mac Bowley, Alex Parry, Richard H, and Diane Dowling

Topics Covered

Read more

Topics Covered

  • Core concepts of Cybersecurity
  • Different types of cyberattacks, such as Social Engineering attacks, Malware, SQL injections, Malicious Bots and physical threats to data, devices and networks
  • Tools to protect data, devices and networks, like strong passwords, biometrics, 2FA, antivirus software, Firewalls and CAPTCHAs
  • Cybersecurity approaches such as input sanitisation, well designed security protocols, and Data and Network Access Control systems

Save this course

Save Introduction to Cybersecurity for Teachers to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Introduction to Cybersecurity for Teachers. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Introduction to Cybersecurity for Teachers will develop knowledge and skills that may be useful to these careers:

Reading list

We haven't picked any books for this reading list yet.
This specialized book focuses on rootkits, a type of malware that gains privileged access to a computer system. It provides an in-depth analysis of rootkit techniques, detection methods, and countermeasures.
This captivating narrative tells the true story of Clifford Stoll's investigation into a computer intrusion, providing a firsthand account of the challenges and rewards of malware analysis.
This specialized book explores the field of memory forensics, focusing on detecting malware and threats in computer memory. It provides advanced techniques and case studies for experienced cybersecurity professionals.
Delves into the art of reverse engineering, a technique used to analyze and understand the inner workings of software. It covers essential principles, tools, and techniques relevant to malware analysis.
This academic book provides a theoretical and practical foundation for understanding computer viruses. It covers the history, classification, and behavior of viruses, as well as methods for detection and prevention.
Focuses on the application of data science techniques to malware analysis. It covers data collection, feature engineering, and machine learning algorithms for detecting and attributing malware attacks.
This comprehensive guide provides a thorough overview of SQL injection attacks, covering their techniques, prevention strategies, and best practices for securing databases. It is highly relevant for understanding the fundamentals of SQL injection and developing effective countermeasures.
This classic reference guide covers various web application security vulnerabilities, including SQL injection. It provides detailed explanations of attack techniques and practical guidance on mitigating these threats.
This technical book深入探讨SQL注入攻击的内部原理及其应对措施。It includes advanced topics such as blind SQL injection and stored procedure attacks, providing valuable insights for security professionals.
This practical guide covers open-source tools and techniques used by penetration testers. It includes a section on SQL injection testing tools, providing valuable resources for security professionals.
This highly acclaimed book provides a comprehensive overview of software security assessment, including a chapter on SQL injection. It offers insights into the latest attack techniques and best practices for securing software applications.
This comprehensive guide to web application security covers SQL injection as one of the most prevalent vulnerabilities. It provides detailed explanations of attack techniques and offers practical advice for securing web applications.
While primarily focused on cryptography, this book briefly discusses SQL injection as a common web application vulnerability. It provides a high-level overview of attack techniques and emphasizes the importance of secure coding practices.
By Kevin Mitnick, a former hacker and convicted felon, provides a comprehensive overview of social engineering techniques and how to protect against them.
By Christopher Hadnagy, a renowned social engineer, delves into the psychological and sociological aspects of social engineering.
Although not specifically about social engineering, this book by Robert Cialdini explores the principles of persuasion and how they can be applied to influence behavior.
By Richard Ford examines the human factor in information security and how social engineering attacks can exploit vulnerabilities in human behavior.
This hands-on guide provides a step-by-step approach to malware analysis, covering reverse engineering, static analysis, and dynamic analysis techniques. It includes practical exercises and real-world examples.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Introduction to Cybersecurity for Teachers.
Edge Computing Fundamentals
Most relevant
Network Defense Essentials (NDE)
Cybersecurity and Privacy
Digital Shield: Cybersecurity for Data and System...
Connect and Protect: Networks and Network Security
Digital Shield: Cybersecurity for Data and System...
Introduction to Cybersecurity Fundamentals
IT Fundamentals for Business Professionals: Cybersecurity...
Networking Tunnels in Junos OS
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser