Explore.
Watch, listen, debate & discover with our experts

RSS Icon

Blackhat, dark night: Could hackers really cause a power outage?

Blackhat, dark night: Could hackers really cause a power outage? Creative commons image Credit: Eva Rinaldi under CC-BY-SA licence
Introductory level Duration 10 mins Updated 25 Feb 2015
Although the nuclear meltdown depicted in Blackhat is fiction, Mike Richards warns there are other ways those with bad intentions could switch our...

What do I need to know about the SIM hack?

What do I need to know about the SIM hack? Creative commons image Credit: yum9me under CC-BY-NC-ND licence
Duration 5 mins Updated 25 Feb 2015
Revelations that security forces have broken the protection of mobile phone technology are a real concern. Mike Richards explains why - and how the...

Highlights and lowlights of 2014, a golden year for cybercrime

Highlights and lowlights of 2014, a golden year for cybercrime Creative commons image Credit: Ethan Prater under CC-BY-2.0 licence
Introductory level Duration 10 mins Updated 02 Jan 2015
In 2014 we learnt how powerful hackers and cyber criminals are, will this continue in to 2015? Andrew Smith takes a look back at the year of...

Embarking on a career in cyber security

Embarking on a career in cyber security Copyrighted image Credit: © Oksipix | Dreamstime.com - Cyber Security Photo
Duration 5 mins Updated 22 Dec 2014
Are you interested in a career in cyber security? Find out what career paths you can take here. 

Will there be a Silk Road 3.0?

Will there be a Silk Road 3.0? Creative commons image Credit: Ricardo Wanglicensed for reuse under CC BY-NC-SA 2.0
Updated 28 Nov 2014
After the Silk Road there was Silk Road 2.0, and now that’s gone. Will there be a Silk Road 3.0?

Theresa May’s new Big Brother powers won’t help catch more criminals

Theresa May’s new Big Brother powers won’t help catch more criminals Copyrighted image Credit: Flynt | Dreamstime.com
Introductory level Duration 10 mins Updated 26 Nov 2014
Enabling the police to identify who is using a digital device at any time won't catch up with the more advanced criminals, writes Andrew Smith....

Everything you've ever wondered about Tor

Everything you've ever wondered about Tor Creative commons image Credit: Matt Katzenbergerlicensed for reuse under CC BY-NC-SA 2.0
Updated 25 Nov 2014
We shine the light on the pros and cons of using Tor, a highly secure method of sending and receiving information across the Internet.

What are your chances during a zombie apocalypse?

What are your chances during a zombie apocalypse? Creative commons image Credit: Sam Javanrouh under CC BY-NC 2.0 licence
Updated 23 Sep 2014
According to mathematics we'd all die in a zombie apocalypse but nature and computer science offer us more optimistic outcomes. 

Three ways your personal photos are vulnerable to hackers

Three ways your personal photos are vulnerable to hackers Creative commons image Credit: Mingle MediaTV under CC-BY-SA licence
Introductory level Duration 10 mins Updated 01 Sep 2014
Leaked nude snaps from the likes of Jennifer Lawrence's iCloud stresses how vulnerable our personal photos are to hacking. In light of this, how...

Free OpenLearn courses.
OU course extracts and exclusive free courses

RSS Icon

An introduction to software development

Free CourseFree Course
An introduction to software development Copyright free image Credit: iStock
Masters level Duration 6 hours Updated 16 Oct 2014
Software development is the practice of organising the design and construction of software, the beating heart of much technology fundamental to our...

Computers and computer systems

Free CourseFree Course Featuring: VideoVideo
Computers and computer systems Copyrighted image Credit: Used with permission
Intermediate level Duration 20 hours Updated 17 Oct 2013
Computers and processors are ubiquitous in everyday life, and they're not only found in your PC. This unit introduces the different parts of...

Representing and manipulating data in computers

Free CourseFree Course
Representing and manipulating data in computers Copyrighted image Credit: Used with permission
Intermediate level Duration 20 hours Updated 30 Jun 2011
Computers are all around us: in cars, kitchen scales, digital cameras, etc. But how do they store the data they hold? This unit will help you to...

Visualisation: Visual representations of data and information

Free CourseFree Course
Visualisation: Visual representations of data and information Copyrighted image Credit: Used with permission
Intermediate level Duration 8 hours Updated 15 Jun 2011
Modern society is often referred to as 'the information society' - but how can we make sense of all the information we are bombarded with? In this...

Natural intelligence

Free CourseFree Course
Natural intelligence Copyrighted image Credit: Used with permission
Advanced level Duration 10 hours Updated 26 Apr 2011
One goal of artificial intelligence is to bulid machines that can operate in the real world, with all its noise and uncertainty. Much of what we...

Machines, minds and computers

Free CourseFree Course
Machines, minds and computers Copyrighted image Credit: Used with permission
Advanced level Duration 10 hours Updated 26 Apr 2011
Computers are becoming smarter and may soon become intelligent. This unit looks at what “intelligence” is, how computers may become so, and...

Become an OU student.
Change your life with a qualification

RSS Icon

Software engineering

CourseCourse
Software engineering Copyrighted image Credit: The Open University/Karen Parker Updated content
Masters level Duration 300 hours Updated 01 Apr 2015 Register by 30 Sep 2015
Explore the advanced concepts and techniques used throughout the software life cycle, for the effective production and management of large, complex...