In today’s world, no one is safe from cyber-attacks, but everyone can be prepared. This course will teach you how malicious actors use social manipulation and technology to launch devastating attacks – and provide you with the tools you'll need to defend against them. Whether you pursue one of the many available jobs in cybersecurity or just want to secure your own privacy, you'll learn how to make the Internet safer.



Trace the evolution of cybersecurity from the early days of computing to the present day. Students will identify and analyze significant cyber attacks that have occurred throughout history, examining their impact on the development of cybersecurity measures and the industry as a whole.
Discover how various operating systems (Linux, Windows, macOS, iOS, Android) can be exploited and learn strategies for monitoring, analyzing, and securing them from breaches.
Gain hands-on experience with cryptographic tools and learn how to apply cryptographic techniques to ensure data confidentiality and integrity in their personal and professional lives.
Learn about key cybersecurity frameworks, such as the National Institute of Standards and Technology (NIST) framework, and how to apply these frameworks to analyze and mitigate vulnerabilities within security systems.
Explore a range of open-source cybersecurity tools and receive practical training on how to install, configure, and use these tools to detect vulnerabilities and secure systems against attacks.
Learn and implement strategies and methodologies for safeguarding digital information, focusing on the importance of access controls, encryption, and secure file storage to prevent unauthorized access and data breaches.
This course is delivered online through an institution of the Lower Cost Models Consortium (LCMC) that is different than your degree-granting institution that awards the academic credit for the course.