Skip to content

In this practice-oriented Bachelor in Cyber Security study programme, available fully online, you will be trained as a threat hunter with leadership potential. You will acquire the latest knowledge in the field of Cyber Security and deal with the architecture, programming and maintenance of security systems.

License

Notifications You must be signed in to change notification settings

Bassamejlaoui/Open-Source-Cybersecurity-University

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

The Open Source Cybersecurity University The CyberPolyglot

Start your online Bachelor degree in Cyber Security.

image

In this practice-oriented Bachelor in Cyber Security study programme, available fully online, you will be trained as a threat hunter with leadership potential. You will acquire the latest knowledge in the field of Cyber Security and deal with the architecture, programming and maintenance of security systems.

In this BSc cyber security course, you will learn not just about incident response and digital forensics, but also aspects of penetration testing and reverse engineering in order to understand the perspective of cyber criminals and protect against them.

Year 1

Module Courses Alternative Courses Links
Operating Systems, Computer Networks, and Distributed Systems Operating Systems: Three Easy Pieces Operating Systems and You: Becoming a Power User (Coursera)
Introduction to Data Protection and IT Security Cybersecurity Basics (edX) Introduction to Cyber Security Specialization (Coursera)
Mathematics: Analysis Khan Academy - Calculus Calculus 1A: Differentiation (edX)
Introduction to Academic Work Study Skills for Academic Success (Coursera) Learning How to Learn (Coursera)
Introduction to Programming with Python Python for Everybody (Coursera) Introduction to Python Programming (Udacity)
Statistics - Probability and Descriptive Statistics Introduction to Statistics (Udacity) Statistics and Probability (Khan Academy)

Recommended Books:

  • "Operating Systems: Three Easy Pieces" by Remzi H. Arpaci-Dusseau and Andrea C. Arpaci-Dusseau
  • "Python Crash Course" by Eric Matthes
  • "Introduction to Probability and Statistics for Engineers and Scientists" by Sheldon M. Ross

Year 2

Module Courses Alternative Courses Links
Object-Oriented Programming with Java Java Programming and Software Engineering Fundamentals (Coursera) Java Programming: Solving Problems with Software (Coursera)
Mathematics: Linear Algebra Khan Academy - Linear Algebra Linear Algebra (MIT OpenCourseWare)
Collaborative Work Teamwork Skills (Coursera) Collaborative Working in a Remote Team (FutureLearn)
Introduction to Network Forensics Network Forensics (Udemy) Network Forensics (Cybrary)
Requirements Engineering Software Processes and Agile Practices (Coursera) Requirements Engineering: Secure Software Specifications (Coursera)
System Pentesting Basics Penetration Testing and Ethical Hacking (Pluralsight) Introduction to Penetration Testing (Cybrary)

Recommended Books:

  • "Effective Java" by Joshua Bloch
  • "Linear Algebra and Its Applications" by David C. Lay
  • "The Basics of Hacking and Penetration Testing" by Patrick Engebretson

Year 3

Module Courses Alternative Courses Links
Intercultural and Ethical Decision-Making Ethics, Technology and Engineering (edX) Data Science Ethics (Coursera)
Introduction to the Internet of Things IoT Fundamentals: Networking Technologies and Cloud (Coursera) Introduction to IoT (FutureLearn)
Algorithms, Data Structures and Programming Languages Data Structures and Algorithm Specialization (Coursera) Algorithms Specialization (Coursera)
Theoretical Computer Sciences and Mathematical Logic Introduction to the Theory of Computation (edX) Discrete Mathematics for Computer Science (Coursera)
IT Project Management Agile Project Management (Coursera) Introduction to Project Management (edX)
DevSecOps and Common Software Weaknesses DevSecOps: Continuous Security for DevOps (Pluralsight) DevSecOps - The DevOps Way of Security (Udemy)

Recommended Books:

  • "IoT Inc: How Your Company Can Use the Internet of Things to Win in the Outcome Economy" by Bruce Sinclair
  • "Introduction to the Theory of Computation" by Michael Sipser
  • "The DevOps Handbook" by Gene Kim, Jez Humble, Patrick Debois, and John Willis

Additional Modules

Module Courses Alternative Courses Links
IT Service Management ITIL Foundations (Coursera) Introduction to ITIL 4 (Udemy)
Cryptography Cryptography I (Coursera) Applied Cryptography (Coursera)
IT Law Introduction to Cyber Law (Coursera) Internet Giants: The Law and Economics of Media Platforms (Coursera)
Host and Software Forensics Host Based Forensics (Udemy) Digital Forensics Concepts (Cybrary)
Artificial Intelligence Elements of AI (Coursera) Introduction to Artificial Intelligence (edX)
Information Security Standards ISO 27001 Information Security Management (Udemy) Information Security Management Fundamentals (Coursera)
Seminar: Current Topics in Computer Science Special Topics in Computer Science (Coursera) Current Trends in Computer Science (edX)
Advanced Data Analysis Data Analysis with Python (Coursera) Data Analysis: Essential Skills (edX)
Project: Data Analysis Data Analysis Project (Coursera) Capstone: Applying Data Science to Business Problems (Coursera)
Cloud Computing Cloud Computing Basics (Coursera) Introduction to Cloud Computing (edX)
Elective A See elective options below
Elective B See elective options below
Elective C See elective options below
Bachelor Thesis & Colloquium Capstone Project

Elective A Options:

Module Courses Alternative Courses Links
IT Security Consulting IT Security Consulting (Coursera) Information Security: Context and Introduction (Coursera)
Social Engineering Social Engineering Tactics (Pluralsight) Social Engineering: The Art of Human Hacking (Udemy)
Host Forensics Advanced Host Forensics (Pluralsight) Computer Forensics and Investigations (Udemy)
DevSecOps Advanced DevSecOps (Pluralsight) DevSecOps Masterclass (Udemy)
Security in Complex Networks Network Security (Coursera) Network Security Fundamentals (Pluralsight)
Network Forensics Network Forensics Advanced (Pluralsight) Network Forensics (Udemy)

Elective B Options:

Module Courses Alternative Courses Links
Business Intelligence Business Intelligence Basics (Coursera) Introduction to Business Intelligence (edX)
Future Threats Emerging Cyber Threats (Cybrary) Future Threats (Pluralsight)
Cloud Security Cloud Security Fundamentals (Coursera) Cloud Security Basics (edX)
Pentesting Advanced Pentesting (Udemy) Pentesting and Ethical Hacking (Pluralsight)
Industrial Systems Technology Industrial Systems (Coursera) Introduction to Industrial IoT (edX)
Cyber Threat Intelligence Cyber Threat Intelligence (Pluralsight) Introduction to Cyber Threat Intelligence (Coursera)
Mobile Threats Mobile Security (Coursera) Mobile Security and Hacking (Pluralsight)

Elective C Options:

Module Courses Alternative Courses Links
IT Security Consulting IT Security Consulting (Coursera) Information Security: Context and Introduction (Coursera)
Social Engineering Social Engineering Tactics (Pluralsight) Social Engineering: The Art of Human Hacking (Udemy)
Host Forensics Advanced Host Forensics (Pluralsight) Computer Forensics and Investigations (Udemy)
DevSecOps Advanced DevSecOps (Pluralsight) DevSecOps Masterclass (Udemy)
Security in Complex Networks Network Security (Coursera) Network Security Fundamentals (Pluralsight)
Network Forensics Network Forensics Advanced (Pluralsight) Network Forensics (Udemy)
Business Intelligence Business Intelligence Basics (Coursera) Introduction to Business Intelligence (edX)
Future Threats Emerging Cyber Threats (Cybrary) Future Threats (Pluralsight)
Cloud Security Cloud Security Fundamentals (Coursera) Cloud Security Basics (edX)
Pentesting Advanced Pentesting (Udemy) Pentesting and Ethical Hacking (Pluralsight)
Industrial Systems Technology Industrial Systems (Coursera) Introduction to Industrial IoT (edX)
Cyber Threat Intelligence Cyber Threat Intelligence (Pluralsight) Introduction to Cyber Threat Intelligence (Coursera)
Mobile Threats Mobile Security (Coursera) Mobile Security and Hacking (Pluralsight)
Supply Chain Management Supply Chain Security (Coursera) Supply Chain Management (edX)
Smart Factory Smart Factory Security (Coursera) Smart Manufacturing (edX)
Data Structures and Java Class Library Java Data Structures (Coursera) Data Structures and Performance (Coursera)
Mobile Software Engineering Mobile Development (Udacity) Mobile Development with React Native (Coursera)
Studium Generale General Studies (Coursera) Studium Generale (FutureLearn)
Career Development Career Success Specialization (Coursera) Career Development Planning (Udemy)
Microsoft ERP - Dynamics 365 Business Central - Functional Consultant Microsoft Dynamics 365 (Coursera) Dynamics 365 (Udemy)
SAP - SAP S/4HANA Business Process Integration - Application Associate SAP S/4HANA (Coursera) SAP S/4HANA (Udemy)

This curriculum provides a comprehensive and practical learning path for a Bachelor's degree in Cyber Security, including essential courses, recommended books, and alternative online courses to ensure flexibility and breadth in learning.

About

In this practice-oriented Bachelor in Cyber Security study programme, available fully online, you will be trained as a threat hunter with leadership potential. You will acquire the latest knowledge in the field of Cyber Security and deal with the architecture, programming and maintenance of security systems.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published