The Whole Data Science Major
in One Place

Mobile Device

Oops! We're Not
Mobile Ready Yet

Please use a desktop to access DataRoad.
Our mobile version is coming very soon! 🚀

Security 2

Why?

Data security threats are everywhere in today's digital world - from malware that can steal your personal information to network vulnerabilities that can compromise entire organizations. This course teaches you practical skills to protect yourself and understand how cybersecurity actually works. Whether you're planning to work in IT, data science, or just want to be a more informed digital citizen, understanding these security concepts is essential. The course follows ICDL IT Security certification standards, so you'll learn industry-recognized best practices.

What?

This course covers the fundamentals of data security. You'll study different types of threats (from viruses to social engineering), learn how to secure networks and manage data safely, and understand how to browse the web securely.By the end, you'll understand both how attacks work and how to defend against them.

Curriculum:

â–¶

Security Concepts

Data vs information, cybercrime and hacking definitions, types of threats, value of information protection, CIA triad basics, social engineering methods, identity theft, and file password protection.

â–¶

Malware

Types of malicious software including Trojans, rootkits, backdoors, viruses, worms, spyware, botnets, and dialers. How anti-virus software works, its limitations, and quarantine procedures.

â–¶

Network Security

Network types (LAN, WAN, PAN, MAN), network administrator roles, firewall functions, wireless security protocols (WEP, WPA, WPA2), password policies, and biometric authentication methods.

â–¶

Secure Data Management

Physical device security, backup procedures (incremental vs full), cloud backup services, data restoration, and secure data destruction methods including shredding and degaussing.

â–¶

Secure Web Use

Identifying secure websites (HTTPS, lock icons), pharming attacks, digital certificates, one-time passwords (OTP), cookie management, and content control software.

Notes

This course follows the ICDL IT Security certification curriculum. If you're planning to take the ICDL certification exam, this course covers all the required topics and will prepare you well for it.