Skip to content

Safe computing

Grid List Results: 12 items
Copyrighted  image Icon Copyright: marchmeena29/iStockphoto.com
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST) free course icon Level Badge icon

Science, Maths & Technology 

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

This free course, Gamified Intelligent Cyber Aptitude and Skills Training (GICAST), will help you to understand online security and start to protect your digital life, whether at home or work. You will learn how to recognise the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you.

Free course
24 hrs
Introducing computing and IT free course icon Level

Science, Maths & Technology 

Introducing computing and IT

This free course, Introducing computing and IT, provides a general overview of how digital technologies have come to dominate virtually every aspect of the modern world and some guidance on how to prepare for this digital life. It raises awareness of the importance of data security and online safety. It also provides an explanation of the internal structure and workings of a typical computer and describes hard and solid state drives in some detail.

Free course
10 hrs
Learning from major cyber security incidents free course icon Level

Science, Maths & Technology 

Learning from major cyber security incidents

  As a society, we are now almost always connected to the internet and rely on it for many different day-to-day activities. However, this dependency on the internet can make us vulnerable to attacks.  Once a connected device is compromised, it is not only that particular device that is affected – it can also be used as a springboard to attack other devices in the same network and in others.  In this connected world, it is also inevitable that personal information is stored in large-scale government and commercial databases. Unfortunately, breaches of these large-scale databases happen fairly frequently and, when they do, personal information can be leaked which will make you, and millions of others affected, vulnerable to scams and other identity crimes.  This course analyses several cyber security incidents and looks at what lessons can be learned.  

Free course
8 hrs
Creative commons image Icon Atomic Taco in Flickr under Creative-Commons license
Introduction to cyber security: stay safe online free course icon Level Badge icon

Science, Maths & Technology 

Introduction to cyber security: stay safe online

This free course, Introduction to cyber security: stay safe online, will help you to understand online security and start to protect your digital life, whether at home or work. You will learn how to recognise the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you.

Free course
24 hrs
Creative commons image Icon Sinchen.Lin under Creative Commons BY 4.0 license
Someone’s attacking our connection to the internet - part one article icon

Science, Maths & Technology 

Someone’s attacking our connection to the internet - part one

The innocent blinking lights on your router in the corner might not be so innocent after all...

Article
Creative commons image Icon ID 6995008 © Ahdrum | Dreamstime.com under Creative Commons BY-NC-SA 4.0 license
How you can be more secure than the President article icon

Science, Maths & Technology 

How you can be more secure than the President

To keep your digital world protected, you don't need to build a border wall - just follow some good security housekeeping advice

Article
Copyright free  image Icon Copyright free: MaxPixel
Getting started with a Password Manager article icon

Science, Maths & Technology 

Getting started with a Password Manager

Overwhelmed by having 12,345 different passwords? Time to get in a manager...

Article
Creative commons image Icon Geoffrey Meyer-van Voorthuijsen under Creative Commons BY-NC 4.0 license
Avoid being held to ransom by SamSam article icon

Science, Maths & Technology 

Avoid being held to ransom by SamSam

The city of Atlanta was shut down by a ransomware attack - what should you do to avoid being a victim of similar attacks?

Article
Copyright free  image Icon Copyright free: Engin_Akyurt
Hacking under your skin? article icon

Science, Maths & Technology 

Hacking under your skin?

A Belgian research team have discovered a way to hack into medical implants.

Article
Copyright free  image Icon Copyright free: fielperson
The house doesn't always win article icon

Science, Maths & Technology 

The house doesn't always win

A short story to get Safe Computing started in its new home...

Article
Creative commons image Icon Maurizio Pesce under Creative Commons BY 4.0 license
Foreign interference? article icon

Science, Maths & Technology 

Foreign interference?

On Monday, two stories appeared in the press about UK government concerns over foreign interference in telecommunications equipment.

Article
Creative commons image Icon The Open University under Creative Commons BY-NC-SA 4.0 license
Ministry of Sharing: Are you a safe sharer? activity icon

Science, Maths & Technology 

Ministry of Sharing: Are you a safe sharer?

Are you a model citizen or a menace to society when it comes to divulging personal details? Take the test from the Ministry of Sharing and find out whether you share too much information.

Activity