MOOC
The massive open online course (MOOC) transports the main insights of CANVAS to a broad public. In particular, the MOOC provides a comprehensive overview of the central principles and challenges in the fields of cyber security, privacy and trust. Concrete case studies from health, business and national security spheres are presented. Technical, legal and ethical perspectives on the issues are included.
Quick Overview
1. Introduction



2. Fundamentals


3. Applying Ethics to Cybersecurity





4. Technical and Legal Aspects of Privacy


Problems






5. Business
Problems: Handling Incidents



6. Vulnerability Discovery and Disclosure





7. Healthcare
Problems




8. Law Enforcement and National Security
Fighting Cybercrime



Cyberwar


9. Cybersecurity and Democracy
Problems
Reference Curriculum as Supplement
The Reference Curriculum and the MOOC are supplementing each other. In the following an overview over the contents of both deliverables is provided.