
Course duration: 0,91h
Cybersecurity professionals frequently find themselves at the center of moral and ethical debates about what they do and how they go about doing it. Tools like big data, artificial intelligence, and biohacking are widely used now, even as the ethical implications have yet to be sorted out. The distinction between morals, ethics, and laws in the cybersecurity space is a topic that applies broadly across the field, and this course is aimed at helping you round out the knowledge that will make you a more effective and successful cybersecurity professional. Instructor Jerod Brennen details the cybersecurity challenges we face today, as well as the challenges of the future—from the use of AI and data, to topics like quantum computing and moral disengagement, as well as how to foster an ethical cybersecurity culture.
Topics include:
This course is in French only. If this is not a problem for you, by all means go ahead and apply.

Course duration: 1,88h
Every day, we interact with our digital devices. At the same time, we’re faced with the threat of cyberattacks that can compromise our privacy and security. Learning the basics of how to secure our digital world will help us avoid becoming victims of a cyberattack. In this beginner-level course, IT Security Foundations series creator Lisa Bock covers basic security concepts. Learn strategies malicious actors use to gain access to your system using social engineering, malware, and spyware. Dive into some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Additionally, find out how to manage cookies when using a browser and discover best practices on how to secure your devices and applications.
Topics include:
- Explain the main elements of the Confidentiality, Integrity and Availability (CIA) Triad.
- Differentiate between risks, threats and vulnerabilities.
- Recognize the different types of malware, and how it can affect a system
- Outline strategies malicious actors use to gain access to your system
- Understand how to manage cookies when using a browser.
- Discuss methods to ensure safe browsing habits
- Summarize the various ways to secure your WiFi connection
- Describe ways to conceal and protect your wireless access point (WAP).
- Cite the differences between public and private key encryption.
- Describe best practices to secure your devices and applications.
This course is in French only. If this is not a problem for you, by all means go ahead and apply.

Course duration: 1,51h
Data security is the process of maintaining the confidentiality, integrity, and availability of an organization’s data. More simply put, it is the process of protecting data from unauthorized access, corruption, or theft. There are several potential consequences that organizations and individuals can face due to bad data security practices. In today’s tech landscape with the increase in use of data in analysis, machine learning models, and AI, it is more important than ever for everyone in an organization to have a solid understanding of data security practices in order to help keep organizations–and themselves–safe. In this course, learn the basics of data security and its potential consequences if ignored. Instructor Monica Royal explores the best practices for protecting the data analytics pipeline and demonstrates some of the most common data anonymization techniques.
Topics include:
- Apply data anonymization techniques, including masking, encryption, generalization, perturbation, and pseudonymization, to protect sensitive information in datasets.
- Evaluate the different storage options for data and implement best practices to secure stored data, including encryption and regular backups.
- Utilize pre-processing techniques such as data anonymization to minimize privacy risks in data analysis and machine learning modeling.
- Identify key personal information (PII) within datasets and assess the implications of using such data in analysis and model training.
- Execute data disposal strategies in accordance with a company’s data retention policy to reduce the risk of data leakage or theft.
- Organize and share data securely, employing encrypted channels and access controls to prevent unauthorized data access.
- Design and participate in data privacy and security awareness training, emphasizing the importance of regular and engaging education for all employees.
- Build a foundational understanding of data privacy regulations and how they influence data collection, storage, analysis, and disposal practices.
This course is in French only. If this is not a problem for you, by all means go ahead and apply.

LTI-link eAcademy.opencourses.be
This course is one of the materials used as part of the security awareness course. The content is intended to describe actions that anyone can take to improve information security.
Cybersecurity isn't solely within your IT department's purview. If you own a smartphone, work on a computer, or use the internet, then you're exposed to a variety of security risks on a daily basis. In this course, instructor Caroline Wong details what
these threats are and what you can do about them—both to protect yourself and your organization. In a series of engaging scenarios, Caroline shines a spotlight on some of the most common security risks you'll encounter in your personal and work life,
as well as how to mitigate them. Learn how to identify and avoid phishing, malware, and social engineering attacks. Plus, get best practices for protecting your accounts, company intellectual property, and online activity.
Learning objectives:
- Protecting sensitive information in your physical office
- Avoiding malware attacks
- Social engineering attacks, such as voice phishing
- Avoiding security attacks on smartphones
- Identifying different types of email scams
- Best practices for working with both public and home Wi-Fi
- The benefits of using VPN
- Creating strong passwords
- Protecting company and employee information