• University of Liverpool logo

Cybercrime Prevention and Protection

Investigate cybersecurity protocol and procedures, and examine the challenges faced when trying to protect online environments.

1,572 enrolled on this course

Hacker internet computer crime cyber attack network cybersecurity programming code password protection.
  • Duration

    4 weeks
  • Weekly study

    2 hours

Explore the fundamentals of cybercrime, hacking, and network security

Over recent years, the number of online services for business and individual use has exploded and so too has the rate of cybercrime.

On this four-week course from the University of Liverpool, you’ll investigate how cybercrime has evolved in the online landscape and identify the types of cyberattacks. You’ll then assess what can be done to protect yourself across online environments.

Discover the role of an ethical hacker

The internet allows users from all over the world to connect, but this also opens us up to attacks.

You’ll explore the types of hackers, learning why they hack, and discovering how ethical hackers use hacking techniques to protect, rather than attack.

You’ll also examine the vulnerability management lifecycle and learn how to conduct vulnerability assessments; a vital, and underused, asset in organisational security procedure.

Learn the common attack vectors of wireless and mobile networks

Mobile devices and wireless networks are the most common way that users engage with the online environment so it’s vital to focus cybercrime prevention efforts in these areas.

Examining wireless local area networks (WLANs) you’ll use this knowledge to identify threats specific to wireless networks and the approaches needed when addressing mobile security.

Identify security issues for emerging technologies

As new and emerging technologies continue to advance online services, our understanding of cyber security must continue to evolve.

You’ll explore the implementation of services using the Internet of Things and 5G technology, identifying the potential vulnerabilities of new apps and services.

By the end of this course, you’ll understand cybersecurity measures used by individuals and organisations and be able to secure your networks and prevent attacks.

Syllabus

  • Week 1

    Cybercrime and the challenges for cybercrime prevention

    • Cup of coffee with a notepad and pen

      Introduction

      An introduction to Week 1 of Cybercrime Prevention and Protection.

    • A blue light against a dark background

      What is Cybercrime?

      In this activity, we consider what cybercrime is, and what cybercriminals do.

    • A word cloud with "cyber security" written and surrounded by relevant terms

      Types of Cybercrime

      In this activity, we explore the different types of cybercrime.

    • Padlock inside a digital circle

      Challenges of Protecting From Cybercrime

      In this activity, we examine the technical, legal and operational challenges of protecting from cybercrime.

    • A person on a laptop smiling

      Conclusion

      We conclude Week 1 with a discussion, a summary and a look ahead to Week 2.

  • Week 2

    Fighting Cybercrime, Penetration Testing and Ethical Hacking

    • Laptop and notepad on a table

      Introduction

      An introduction to Week 2 of Cybercrime Prevention and Protection.

    • A keyboard illuminated with blue and red

      Fighting Cybercrime

      In this activity, we look at how to fight cybercrime, including the use of encryption, digital evidence, and computer forensics.

    • A mysterious hooded figure in front of a computer

      What is a Hacker?

      In this activity, we examine the background of hackers, why they hack, and the types of hackers.

    • A screen with an eye and the words security check

      Vulnerability Management Lifecycle

      In this activity, we explore the vulnerability management lifecycle, an integral part of the security procedures of an organisation.

    • An unlocked padlock in front of a laptop

      Penetration Testing and Ethical Hacking

      In this activity, we consider ethical hacking and penetration testing.

    • Person working at a laptop

      Conclusion

      We conclude Week 2 with a case study, a summary and a look ahead to Week 3.

  • Week 3

    Wireless Networks and Mobile Devices

    • Laptop and a pen

      Introduction

      An introduction to Week 3 of Cybercrime Prevention and Protection.

    • Network cables

      The internet

      In this activity, find out more about how different networks communicate through wired and wireless connections.

    • A screen with the word security written on it

      Protecting Wireless (WIFI) networks

      In this activity, we explore the specific realm of wireless networks and look at possible points of attack on them.

    • A smartphone with security features enabled

      Protecting Mobile Devices

      In this activity, we identify specific attack vectors for smartphones and how to protect from these.

    • Person working on phone and laptop

      Conclusion

      We conclude Week 3 with a case study, a summary and a look ahead to Week 4.

  • Week 4

    Emerging Environments: The Internet of Things and 5G Technology

    • Someone using a smartphone and laptop

      Introduction

      An introduction to Week 4 of Cybercrime Prevention and Protection.

    • A smart home with appliances

      Protecting the Smart Home

      In this activity, we examine the integration of IoT technology. IoT enables the automation of routine operations and maintenance in the home, but with it comes new risks and points of attack.

    • A picture of a ceiling with the 5G graphic superimposed

      Emerging technology: 5G

      In this activity, we look at the emerging technology, 5G. We will consider what 5G is, its functional architecture.

    • A person using a laptop

      5G: Security, threats and challenges

      In this activity, we will look at potential security threats and challenges for 5G.

    • Sunset over Liverpool

      Conclusion

      We conclude Week 4 with a case study, a summary and a look ahead to possible next steps.

Learning on this course

On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Identify the definitions of different types of cybercrime and their consequences
  • Understand the challenges posed by cybercrime prevention
  • Identify a range of established approaches to Ethical Hacking, Penetration Testing and Vulnerability Assessment
  • Develop a comprehensive understanding of Wireless Networks, Mobile Devices, Internet of Things ecosystems, and 5G technology
  • Articulate the need for the use of specific methodologies for implementing security in Wireless Networks, Mobile Devices, Internet of Things ecosystems and 5G technology

Who is the course for?

This course is designed for those who want to further their understanding of internet security challenges, whether in a personal or professional capacity.

It’s particularly suitable for anyone considering a future career in cybersecurity, who wants to understand current risks, threats and responses.

This course would also be beneficial to those interested in how to take practical measures to secure their work or home environment, both on wireless or mobile networks.

Who will you learn with?

Floriana Grasso

Senior Lecturer and Director of Online Learning at the Department of Computer Science, University of Liverpool, UK

Who developed the course?

University of Liverpool logo

University of Liverpool

The University of Liverpool is ranked in the top 1% of higher education institutions worldwide.

Learning on FutureLearn

Your learning, your rules

  • Courses are split into weeks, activities, and steps to help you keep track of your learning
  • Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
  • Stay motivated by using the Progress page to keep track of your step completion and assessment scores

Join a global classroom

  • Experience the power of social learning, and get inspired by an international network of learners
  • Share ideas with your peers and course educators on every step of the course
  • Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others

Map your progress

  • As you work through the course, use notifications and the Progress page to guide your learning
  • Whenever you’re ready, mark each step as complete, you’re in control
  • Complete 90% of course steps and all of the assessments to earn your certificate

Want to know more about learning on FutureLearn? Using FutureLearn

Learner reviews

Get a taste of this course

Find out what this course is like by previewing some of the course steps before you join:

Do you know someone who'd love this course? Tell them about it...

You can use the hashtag #FLCybercrime to talk about this course on social media.