Course curriculum

  1. 1
    • What the Hack?!

    • Five Reasons Why You Should Learn Ethical Hacking

    • Cybersecurity: An EU Top Priority

    • Our Vision: Making the Cyber World a Place of Safety and Opportunity for Youth

  2. 2
    • Module 1 Introduction (video)

    • Module 1: Cybersafety (objectives)

    • Cyber Safety and its Concepts

    • Cyber Threats

    • Trojans

    • What is Phishing? (video)

    • Phishing

    • Phishing Victim (video)

    • Identity Theft

    • Identity Theft Example (video)

    • WhatsApp Scams

    • How to Report Cybercrime

    • Inappropriate Content

    • Staying Safe on Youtube (video)

    • Tips to be Cyber-Safe

    • What is Cyberbullying? (video)

    • Cyberbullying

    • How to report Cyberbullying

    • M1 - Assignment 1: Cybersafety Self-Scan with Action Plan

    • M1 - Assignment 2: Cybersafety Activities

    • M1 - Assignment 3: Cybersafety Awareness (with examples)

    • Cybersafety Quiz

    • Thank you!

  3. 3
    • Module 2 Introduction (video)

    • Module 2: Cybersecurity (objectives)

    • Cybersecurity

    • History of Cybersecurity

    • Cybersecurity Threats

    • Network Security

    • Malware

    • Viruses

    • Virus, Worm, and Trojan (video)

    • Cryptography

    • TLS/SSL

    • Major Incidents in Cybersecurity (timeline)

    • The Dark Side of the Internet

    • Business Risk

    • M2 - Assignment 1: Securing Your Own Home

    • M2 - Assignment 2: Research About Scams

    • M2 - Assignment 3: Researching A Historical Cybercrime

    • M2 - Assignment 4: Wargame

    • Cybersecurity Quiz

    • Thank you!

  4. 4
    • Module 3 Introduction (video)

    • Module 3: Ethical Hacking (objectives)

    • Hacking Concept

    • Legal and Illegal Hacking

    • Ethical Hacking

    • How to Become an Ethical Hacker

    • Key Concepts of Ethical Hacking

    • How to Earn Money from Hacking Legally

    • Famous Hackers

    • Top 5 Places to Practice Ethical Hacking

    • How to Get Started - Learning Ethical Hacking on Your Own

    • What is Hacktivism?

    • The White Hat Oath

    • Ethical Hacker Certification

    • M3 - Assignment 1: Researching the Legality of Hacking

    • M3 - Assignment 2: Court Case Roleplay (with downloadable example)

    • M3 - Assignment 3: Ethics Debate

    • Ethical Hacking Quiz

    • Thank you!

  5. 5
    • Module 4 Introduction (video)

    • Module 4: Career Hacks (objectives)

    • Occupational Trends in the World

    • Job Description

    • Why Study Cyber Security?

    • Studying in the Field of IT & Cyber Defence

    • Estonia - Digital Giant in Cybersecurity (video)

    • Working in the Field of Cyber Defence

    • Digital Competences

    • Future Digital Security and Cybersecurity Competences

    • Cybersecurity Competences

    • M4 - Assignment 1: Magazine Profile of a Famous Hacker

    • M4 - Assignment 2: Interview with a Cybersecurity Professional

    • M4 - Assignment 3: Motivation Letter and CV

    • M4 - Assignment 4: My Professional LinkedIn

    • M4 - Assignment 5: Organise an Event

    • Cybersecurity Meets Robotex (video)

    • Career Hacks Quiz

    • Thank you!

  6. 6
    • Additional Resources

    • Top 10 Famous Hackers

    • Hack through the Holidays (Interview)

    • Make Your Own Magazine/Podcast/Video

    • Glossary of Terms

    • Thank you!