Cybersecurity for citizens and professionals

Arqus MOOC

Syllabus

Week 1: Basic concepts for cybersecurity

1/ What’s in Week 1

Learn about the cybersecurity field and understand its relevance in today’s digital world

2/ Introduction to Information security management

Learn about Information Security concepts and identify the key issues underlying its activities.

3/ Information Security Risk Management

Learn about Information Security Risk Management and the ENISA ITSRM method, including its application.

4/ Criptography

Learn the basics of cryptography and how to manage public and private keys.

5/ Wrap-up

Wrap-up of the week

Week 2: Cybersecurity in networks and end-systems

1/ End-point data protection

Learn about data protection mechanisms across operating systems, identify risks, and configure the right security tools.

2/ How to securely authenticate online

Learn about identity protection risks and apply authentication and authorization mechanisms across operating systems.

3/ Protecting your system

Learn how to apply defensive measures to protect end systems and understand malware concepts and protection strategies.

4/ Communication networks security

Learn how to identify main communication threats and configure basic defensive measures to mitigate network attacks.

5/ Wrap-up

Wrap-up of the week

Week 3: Cybersecurity in mobile devices

1/ Android OS Internals

Learn how the Android operating system works internally, gaining comprehensive knowledge of its architecture and components.

2/ Mobile Apps Static and Dynamic Techniques

Learn how to apply reverse-engineering techniques to Android applications, gaining practical, hands-on experience.

3/ Mobile Apps Reverse-Engineering Techniques

Learn how to use reverse-engineering techniques for Android applications, developing hands-on expertise in the process.

4/ Privacy Threats in Mobile Apps

Learn how to analyze mobile privacy threats, understand regulatory compliance, and use static and dynamic analysis methods to assess app compliance.

5/ Wrap-up

Wrap-up of week 3

Week 4: Cybersecurity in social networks

1/ Digital Identities

Learn how to inventory personal digital identities in a systemic way.

2/ Information Sharing

Learn how friend circles are defined as graphs and identify digital traces in everyday activities, understanding their implications.

3/ Social Engineering and Dark Patterns

Learn how to identify and understand the main cybersecurity threats specific to social networks and their potential impacts.

4/ Self-awareness on Social Media

Learn how to develop and propose effective strategies to enhance resilience against cybersecurity threats on social networks.

5/ Wrap-up

Wrap-up of week

Week 5: Rights, privacy and cyberintelligence

1/ Human and Digital Rights

Learn how human rights translate into cyberspace, understand the challenges involved, and explore the emerging need for new digital rights.

2/ Privacy aspects

Learn how to grasp fundamental privacy concepts, recognize potential privacy risks, and implement effective privacy protection techniques in the digital world.

3/ Cyberintelligence

Learn how to utilize cyberintelligence in cybersecurity, master intelligence-gathering techniques, analyze cyber threats, and extract actionable insights from real-world attacks.

4/ Wrap-up

Wrap-up week 5

Week 6: The market of cybersecurity

1/ Cybersecurity sector (I): The Underground Economy

Learn how malware operates as a business model, explore various monetization strategies, understand modern malware uses, and discover the underground economy supporting cybercrime as a commodity.

2/ Cybersecurity sector (II): Space

Learn how cybersecurity is crucial for space applications, understanding its importance and basic concepts in commercial satellite operations.

3/ Cybersecurity sector (III): Forensics

Learn how digital forensics operates across various sub-branches, exploring market solutions, current challenges, and the impact of AI on forensic techniques in computers, mobile devices, and multimedia.

4/ Cybersecurity sector (IV): Crypto

Learn how cryptography works, including its basic principles, common algorithms, applications in data security, communication protocols, and techniques for maintaining data integrity and authenticity.

5/ Cybersecurity sector (V): Cybersecurity controls assessment & ISO27001 Policies and Controls

Learn how to understand and assess cybersecurity controls, analyze ISO27001 policies, identify control activities and their purposes, and explore practical applications in organizational security.

Wrap-up

Synthesize and test what you learned this week and in the entire course

Newsletter

Don’t miss any news, calls or opportunities from Arqus.
Subscribe now! The future begins today.

    Subscribe


    You can change your mind at any time by clicking the unsubscribe link in the footer of any email you receive from us.

    We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.

    Controller: University of Granada (as Coordinator of the Arqus European University Alliance). Legal basis: Arqus is entitled to process your data under the provisions of Article 6.1. (a) of the GDPR: “the data subject has given consent to the processing of his or her personal data for one or more specific purposes”. Purpose: to manage your subscription to mailing lists and to periodically send you the requested information by electronic means. Recipients: Mailchimp. Rights: access, object, rectification, erasure, restriction of processing, data portability. Additional information here.

    Select our profile:

    Apart from the general information, what specific news would you like to receive from Arqus?

    Controller: University of Granada (as Coordinator of the Arqus European University Alliance). Legal basis: Arqus is entitled to process your data under the provisions of Article 6.1. (a) of the GDPR: “the data subject has given consent to the processing of his or her personal data for one or more specific purposes”. Purpose: to manage your subscription to mailing lists and to periodically send you the requested information by electronic means. Recipients: Mailchimp. Rights: access, object, rectification, erasure, restriction of processing, data portability. Additional information here.

    Arqus
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.