Cyber Security

Learn the basics of the most common cyber attacks, and how to protect yourself.

Enroll into this course

About this course

Cyber security is one of the most important measures to take when training new or current employees. The importance of continuously training employees on cyber security comes from the rapid advancement of technology in our digital age, meaning that extra measures must be taken to ensure our information and knowledge are up-to-date.


This cyber security course is designed to help you protect yourselves and the company against cyber attacks and threats. This 9-part course aims to empower learners with an up-to-date guide based on how to recognise and mitigate any potential cyber threats.


The course begins by introducing injection attacks, explaining broken authentication and session mamangement, cross-site scripting, a review of the 3 most common attacks, broken access control, sensitive data exposure, cross-site request forgery, using components with known vulnerabilities, and underprotected APIs.

What you'll learn with "Cyber Security" course

  • Injection Attacks
  • Broken Authentication and Session Management
  • Cross-Site Scripting (XSS)
  • Review: The 3 most common attacks
  • Broken Access Control
  • Sensitive Data Exposure
  • Cross-Site Request Forgery (CSRF)
  • Using Components with Known Vulnerabilities
  • Underprotected APIs

"Cyber Security" Content

  • Injection Attacks

    Learn what an SQL Injection attack is, and why it is one of the most common. In this lesson, you'll also learn ways to protect systems from this very easily exploitable vulnerability.

    Lesson Excerpts

    • This is our main man Thomas. He's just made his first ever website!

      This is our main man Thomas. He's just made his first ever website!
    • How can Thomas fix up his site so Emily can't attack it?

    • Prevention

  • Broken Authentication and Session Management

    Learn about Broken Authentication and Session Management, one of the most common ways sites open up themselves to attacks on users and their own data.

    Lesson Excerpts

    • Since we last spoke to Thomas, he's found his niche, and his website has become very popular! Thomas has started to make money from online ads, and wants to keep this separate from his other income.

      Since we last spoke to Thomas, he's found his niche, and his website has become very popular! Thomas has started to make money from online ads, and wants to keep this separate from his other income.
    • Predictable Passwords This is one of the most common ways to get caught out online. Websites should not allow you to use passwords like "12345" or "password", and sites that do open themselves up to vulnerabilities.

      Predictable Passwords This is one of the most common ways to get caught out online. Websites should not allow you to use passwords like
    • Risk Report After the breach, Thomas' Bank commissioned a risk report about Broken Authentication and Session management. Press each section to examine the report.

  • Cross-Site Scripting (XSS)

    Learn about cross site scripting (XSS) vulnerabilities, and how they have worked on some huge sites. Learn what you can do to protect your site from this major vulnerability.

    Lesson Excerpts

    • Emily's a very knowledgeable internet user, and today, she's decided to look for some vulnerabilities in everyday websites.

      Emily's a very knowledgeable internet user, and today, she's decided to look for some vulnerabilities in everyday websites.
    • To avoid Client XSS, you should use context-sensitive escaping to ensure it cannot run.

    • Risk of Cross-Site Scripting

  • Review: The 3 most common attacks

    In this lesson, review the 3 most common cyber security risks.

    Lesson Excerpts

    • Put these vulnerabilities in order of prevalence

    • Match each image with the vulnerability it demonstrates

    • SQL injection is where a bad actor sends simple, text based commands to execute an attack.

  • Broken Access Control

    Learn how Broken Access Control can lead to vulnerabilities in online security.

    Lesson Excerpts

    • It's been a while now, and Thomas is quite happy with his site as it is. He's got multiple features and plugins installed.

      It's been a while now, and Thomas is quite happy with his site as it is. He's got multiple features and plugins installed.
    • Prevention

  • Sensitive Data Exposure

    Learn which sorts of data are vulnerable and important to protect on your website.

    Lesson Excerpts

    • Our successful friend Thomas has decided to start selling his products online. He decided to accept Credit Cards on his website.

      Our successful friend Thomas has decided to start selling his products online. He decided to accept Credit Cards on his website.
    • Is Sensitive Data Exposure easy or hard to exploit?

  • Cross-Site Request Forgery (CSRF)

    Learn how this lesser-known cross-site vulnerability can spell danger for some websites.

    Lesson Excerpts

    • Emily is taking a day off hacking, and is paying her friend for a concert ticket.

      Emily is taking a day off hacking, and is paying her friend for a concert ticket.
    • Prevention

    • What has Emily's bank forgotten to implement in their site?

  • Using Components with Known Vulnerabilities

    Learn how to keep your knowledge of known vulnerabilities up-to-date with some simple tools.

    Lesson Excerpts

    • Thomas' website has expanded! He's got heaps of features - some of which he didn't code himself.

      Thomas' website has expanded! He's got heaps of features - some of which he didn't code himself.
    • Prevention

    • Is this statement true or false?

  • Underprotected APIs

    Learn how underprotected APIs can create unintended vulnerabilities.

    Lesson Excerpts

    • Thomas is working on his site, which by now, has plenty of plugins.

      Thomas is working on his site, which by now, has plenty of plugins.
    • Prevention

    • Is the following statement true or false?

"Cyber Security" Author

EdApp

EdApp is a leader in training for the mobile workforce. As a microlearning platform EdApp delivers tens of thousands of lessons a day globally. The use of gamification and social learning make EdApp a platform that boasts engagement across the board. The content library now lets you access world class content for you and your team. EdApp has set out to democratize learning and give everyone a classroom in their pocket.

Selected Review

"Cyber security training is something we often face in our workplace but I've never experience a course so engaging! The way each lesson focuses on a different aspect is so useful and has really helped me learn everything I need to know."

Users also learned

Other Courses By EdApp

Explore more

EdApp is easy to use and free for you and your team. No credit card required.

or book a demo with us today!