In this ever-changing digital landscape, we are facing more and more cybersecurity risks. These risks affect anyone and everyone - ranging from individuals, financial institutions, large corporates and national governments. It’s crucial to be aware of the vulnerabilities we are exposed to. In this pathway on cybersecurity, Ciaran explores some of the main types of cybersecurity risks and then outlines protection measures that we can deploy, as well as information on recovery in the event of a cyberattack

Join now to watch

Access this and 100s of other videos by signing up for a 14-day free trial.

CPD credits earned

CPD certification


Watch all the videos and pass the test to obtain a certificate showing your completion of this Pathway. Certificates can be shared directly to your LinkedIn profile and social media accounts.

7 videos • 1 hour 11 minutes

  • Introduction to Malware

    There are a number of precautions that both individuals and businesses can take to prevent, or at the very least limit, the harmful effects malware can have on them. In this video, Ciaran explains what malware is and what its specific kinds are. He further explains the damage they have inflicted in the real world.

    Ciaran Rooney12:07

  • How to Protect Yourself Against Malware

    The digital world is fraught with potential risks and dangers for both individual users and businesses. Fortunately, there are several ways in which we can minimise our chances of becoming a victim as we have explored. Join Ciaran as he explains how cybercriminals distribute malware and, how to protect yourself and your devices from it.

    Ciaran Rooney08:00

  • Introduction to Cryptography

    In this next video on Cybersecurity, Ciaran will introduce cryptography, its history and also the principles and roles of cryptography in modern communication systems and the 2 main types of cryptographic techniques.

    Ciaran Rooney11:46

  • Email Encryption Techniques

    In the previous video on Cybersecurity, Ciaran introduced the history and origins of cryptography and the 2 types of techniques used. In this video, Ciaran will explain why it is needed, the different stages at which a mail can be intercepted, how longer keys improve encryption safety and the models and standards used for email encryption today.

    Ciaran Rooney10:42

Other Pathways you may like




9 videos • 1 hour 28 minutes

GDPR: A Legal Lens


GDPR: A Legal Lens

4 videos • 41 minutes

GDPR: Compliance


GDPR: Compliance

10 videos • 1 hour 52 minutes