Introduction to cyber security: stay safe online
Introduction to cyber security: stay safe online

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Introduction to cyber security: stay safe online

Acknowledgements

This course was written by Arosha K. Bandara. It was last updated in December 2019.

Except for third party materials and otherwise stated in the acknowledgements section, this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] .

The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this course:

Images

Introduction and guidance

Course image: Atomic Taco  in Flickr made available under Creative Commons Attribution-ShareAlike 2.0 Licence .

Week 1

Figure 1 © Blend Images - Colin Anderson (via Getty Images)

Figure 2 © xxz114 (via iStock photo)

Figure 3 © caracterdesign (via iStock Photo)

Figure 4 © bluebird13 (via iStock Photo)

Figure 5 © agsandrew (via shutterstock)

Figure 6 © Ryan McGinnis (via Getty Images)

Figure 7 © Jasper James (via Getty Images)

Figure 8 © Vetta Collection (via iStock Photo)

Figure 9 © JGI/Tom Grill (Getty Images)

Figure 10 © LeoPatrizi, sb-borg (via iStock Photo); mediaphotos (via Getty Images)

Figure 11 © Danil Melekhin (via Getty Images)

Figure 12 © Jimmy Anderson (via iStock Photo)

Week 2

Figure 1 © agsandrew (via Fotolia)

Figure 2 © beaucroft (via iStock Photo)

Figure 3 © piotr_malczyk (via iStock Photo)

Figure 4 © dcdp (via iStock)

Figure 5 © dsteller (via iStock Photo)

Figure 6 © Garry518 (via iStock Photo)

Figure 7 © Andrey_Kuzmin (via iStock Photo)

Figure 8 © FredFroese (via iStock Photo)

Figure 9 © lek2481 (via iStock Photo)

Figure 10 © David Clark (via Getty Images)

Figure 11 © pagadesign (via iStock Photo)

Figure 12 © Alan Uster (via Shutterstock)

Week 3

Figure 1 © Eraxion (via iStock Photo)

Figure 2 © JordiRoy (via iStock Photo)

Figure 3 © Colin Anderson (via Getty Images)

Figure 4 © vadimguzhva (via iStock Photo)

Figure 5 © Carol and Mike Werner/Visuals Unlimted, Inc. (via Getty Images)

Figure 6 © Yugi Studio (via Getty Images)

Figure 7 © Stephan Zabel (via Getty Images)

Figure 8 © Trina Dalziel (via Getty Images)

Figure 9 © Andrew Levine http://commons.wikimedia.org/wiki/File:PhishingTrustedBank.png

Figure 11 © Dimitri Otis (via Getty Images)

Figure 12 © enjoynz (via iStock Photo)

Figure 13 © ryccio (via Getty Images)

Figure 14 © aydinmutlu (via iStock Photo)

Figure 15 © John Lamb (via Getty Images)

Figure 16 © Danil Melekhin (via Getty Images)

Figure 18 © FreezeFrameStudio (via iStock Photo)

Figure 20 © webking (via iStock Photo)

Figure 21 © addimage (via iStock Photo)

Week 4

Figure 1 © Michael Smith (via Getty images)

Figure 2 © bioraven (via Shutterstock)

Figure 3 © Mark Horn (via Getty Images)

Figure 4 © bluebird13 (via iStock Photo)

Figure 5 © olhainsight (via iStock Photo)

Figure 6 © powerofforever (via iStock Photo)

Figure 7 © Bet_Noire (via iStock Photo)

Figure 8 © Scorpions and Centaurs (via Flickr.com)

Figure 9 © no_limit_pictures (via iStock Photo)

Figure 11 © chrisroll (via iStock Photo)

Figure 12 © Pashalgnatov (via iStock Photo)

Figure 13 © Catrina Genovese (via Getty Images)

Figure 14 © John Lund (via Getty Images)

Week 5

Figure 1 © Bletchley Park Trust (via Getty Images)

Figure 2 © Bob Lord - Licensed under Creative Commons Attribution-Share Alike 3.0 via Wikimedia Commons - http://commons.wikimedia.org/wiki/File:Enigma-plugboard.tif.jpg#mediaviewer/File:Enigma-plugboard.tif.jpg

Figure 3 © agsandrew (via Shutterstock Photos)

Figure 5 © peterhowell (via iStock Photo)

Figure 6 © GlobalP (via iStock Photo)

Figure 7 © blackie (via iStock Photo)

Figure 10 © Wavebreak (via iStock Photo)

Figure 11 © choicegraphx (via iStock Photo)

Figure 12 © Vertigo3d (via iStock Photo)

Week 6

Figure 1 © narvikk (via iStock Photo)

Figure 2 © HAYKIRDI (via iStock Photo)

Figure 3 © Underwood Archives (via Getty Images)

Figure 4 © vmedia84 (via Fotolia)

Figure 5 © RapidEye (via iStock Photo)

Figure 6 © OJO_Images (via iStock Photo)

Figure 7 © belterz (via iStock Photo)

Figure 8 © BaderElbert (via iStock Photo)

Figure 9 © Hugh Threlfall (via Getty Images)

Figure 10 © Isantilli (via iStock Photo)

Week 7

Figure 1 © Alex Wong (via Getty Images)

Figure 2 © Herzstaub (via iStock Photo)

Figure 3 © Mdbeckwith http://creativecommons.org/licenses/by-sa/3.0/deed.en

Figure 4 © zimmytws (via iStock Photo)

Figure 5 © peeterv (via iStock Photo)

Figure 6 © RapidEye (via iStock Photo)

Figure 7 © fstop123 (via iStock Photo)

Figure 8 © stayorgo (via iStock Photo)

Figure 9 © Nico Elnino/Getty Images

Figure 10 © Shaun Curry (via Getty Images)

Figure 11 © David Gould (via Getty Images)

Figure 12 © wakila (via iStock Photo)

Figure 13 © scanrail (via iStock Photo)

Figure 14 © Jeff Nagy (via iStock Photo)

Figure 15 © v777999 (via iStock Photo)

Figure 16 © Scorpions and Centaurs (via Flickr.com)

Figure 17 © scyther5 (via iStock Photo)

Figure 18 © kirillm (via iStock Photo)

Figure 19 © Mari (via iStock Photo)

Week 8

Figure 1 © 1joe (via iStock Photo)

Figure 3 © scotto72 (via iStock Photo)

Figure 8 © swilmor (via iStock Photo)

Figure 9 © DonNichols (via iStock Photo)

Figure 10 © ishoot63 (via iStock Photo)

Figure 11 © btrenkel (via iStock Photo)

Figure 12 © mjutabor (via iStock Photo)

Figure 13 © Geoffrey Meyer-van Voorthuijsen / flickr (Creative Commons BY-NC 2.0)

Figure 14 © wakila (via iStock Photo)

Figure 15 © Mordolff (via iStock Photo)

Audio visual

Week 1

1 Online, the new frontline © HM Government 

1.3 and 2.1 © The Open University

Week 2

2.1 How to pick a proper password (including transcript) © Sophos

Week 4

2 extract (including transcript) from Datababy: How easy is it to become a phone hacker? © Channel4/ITN

Week 5

2.1 and 2.2 © The Open University

Week 7

1 extract (including transcript) from 'Inside Out’ (6/2/12) © BBC

Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.

Don't miss out:

1. Join over 200,000 students, currently studying with The Open University – http://www.open.ac.uk/ choose/ ou/ open-content

2. Enjoyed this? Find out more about this topic or browse all our free course materials on OpenLearn – http://www.open.edu/ openlearn/

3. Outside the UK? We have students in over a hundred countries studying online qualifications – http://www.openuniversity.edu/ – including an MBA at our triple accredited Business School.

CYBER_B1

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371