Back to Top

About the course

decorative line

The course is designed for students and all those whose daily life is incomplete without computers, smartphones and tablets. It will be of interest to anyone who uses social networks, email, news resources, or simply searches for information on the Internet.

dashboard

Course structure

decorative line

The course covers the concepts of information security that are most important for ordinary users. It describes the main threats in the information space and basic methods of countering these threats. Three steps of successful completion of the course:

1

Familiarize yourself with the theoretical material

This is an interactive collection of clear, bright and sometimes animated information about protecting your computer and personal information in the context of modern cyber threats and cyber risks.

2

Perform the suggested exercises

There are a lot of practical tasks in the course – they will help you practice solving real life situations without harming your own computer or smartphone.

3

Pass the test and get a certificate

The certificate of completion of the course will certify your readiness to apply newly obtained cybersecurity background in the information space uninsured from hacker attacks.

Module topics

decorative line
details image

Main users’ mistakes

In this module you will learn:

  • Is it possible to use the Internet without falling into the traps of fraudsters
  • How do hackers gain access to our personal data and media
  • What are the consequences of cyberattacks on users
REGISTRATION
details image

Safe use of mobile phones

In this module you will learn:

  • What are the threats posed to mobile media
  • What harm can be caused if you violate security rules when using your phone
  • What recommendations should you follow to protect yourself from hackers
REGISTRATION
details image

Safe use of computers

In this module you will learn:

  • What causes the emergence and spread of computer crime
  • What harm can a violation of security rules cause when using a computer
  • What recommendations should you follow to protect yourself from hacker attacks
REGISTRATION
details image

Safe use of email

In this module you will learn:

  • What makes email to be attractive to hackers
  • What attacks can be carried out via email
  • What steps should be taken to secure your account and notifications
REGISTRATION
details image

Safety in social networks

In this module you will learn:

  • What personal information of users is shown through social networks
  • Why data leaks occur
  • How do you set up privacy settings
  • What should you avoid when using social networks
REGISTRATION
details image

Safe use of the Internet

In this module you will learn:

  • What caused the need to take care of security when using the Internet network
  • What harm can a violation of security rules cause when using the Internet resources
  • What recommendations should be followed to protect yourself from attacks by cybercriminals
REGISTRATION
details image

Types of malicious software

In this module you will learn:

  • What causes the need to protect your personal computers and mobile devices from dangerous programs
  • What types of programs are created by hackers and how much damage they can cause
  • What recommendations should be followed in order to recognize malicious software in time and protect yourself from hacker attacks
REGISTRATION
details image

Fake news

In this module you will learn:

  • The concept of fake news and its varieties
  • Sources of origin and distribution channels of false information
  • How to verify information and recognize manipulations
REGISTRATION
details image

The basic rule of data protection

In this module you will learn the rules related to various aspects of data protection, namely

  • Physical security
  • Use of passwords
  • Backup copying
  • Using licensed software, antivirus software, and firewalls
  • Using social networks
  • Knowledge of ways to protect yourself from possible dangers and threats
REGISTRATION
details image

What to do if you got into a trouble

In this module, you will learn how to behave in the following cases:

  • Account is hacked
  • Your computer is infected with viruses
  • The attacker knows your bank card details
  • Electronic device or personal data was stolen
REGISTRATION

Be aware:

decorative line

This course is developed by CRDF Global, in cooperation with EY Ukraine experts, as a part of CRDF Global's cybersecurity programming in Ukraine, implemented with support from the Department of State’s Office of the Coordinator of U.S. Assistance to Europe and Eurasia.

REGISTRATION

This course will allow:

  • To learn about the main threats in the information space and what danger they pose
  • To analyze the consequences of successful implementation of malicious attacks
  • To understand what information is the main goal of hackers and why it should be protected
  • To remember main recommendations for the protection of personal data, safe use of electronic devices and information resources

This course will not allow you to:

  • Waste time. The training will last only 60 minutes.
  • To get bored. The course material is presented in an easy-to-understand form: animated stories and interactive exercises.
  • To spend a lot of money. Training and further obtainment of a certificate are absolutely free.
  • To remain indifferent. In the modern world, cybersecurity issues are relevant for everyone.

FAQ:

decorative line
  • Q

    Q – What happens after the registration?

  • A A - -After registering in the system, you will receive an email with a link to activate your account. After clicking on the link, you can log in and start working on the course.
  • Q

    Q – How to get a certificate?

  • A A - -In order to get a certificate, you need to pass all the modules of the course and pass the general test. After successfully passing the test, you will be able to get a personal certificate.
  • Q

    Q – What to do if there is a problem?

  • A A - If you have a technical problem, please contact customer support – [email protected].
  • Q

    Q - who should I report an error or recommend an improvement?

  • A A - If you have any suggestions for the course improvement, please write to – [email protected].

Only amateurs attack machines; skillful Hackers or professional target people.

Bruce Schneier, computer security specialist
Registration