Computers and the Internet, smartphones and apps have pervaded our daily lives. Working without computers is hardly imaginable; we go shopping on the Internet and order a taxi with a smartphone app. The ongoing digital transformation will reinforce this even more. The digitization of our personal lives, companies, and industries exposes many new opportunities and can add comfort to our daily routines. However, network connections to homes, businesses, and industrial facilities and virtual controls not only allow access to legitimate users, but are also zones for malicious forces to attack. This course illustrates how our world has become more and more digitized and highlights the unfamiliar threats that lurk in the shadows of the bright new digital age.
Self-paced
Language: English

Course information

Computers and the Internet, smartphones and apps have pervaded our daily lives, professionally as well as privately. Working without computers is hardly imaginable; we go shopping on the Internet and order a taxi or pizza with our smartphone. The ongoing digital transformation will reinforce this even more, mirroring an increasing number of physical entities in cyberspace. Your fridge will order milk when you run low, your house will turn down the heating when you’re not at home, your washing machine will run automatically when electricity rates are lowest.

The digitization of our personal lives, companies, and industries exposes many new opportunities and can streamline and add comfort to our daily routines. However, every coin has two sides. Network connections to homes, businesses, and industrial facilities and virtual controls not only allow access to legitimate users, but also pose a threat as zones for malicious forces to attack. This course illustrates how our world has become more and more digitized and highlights the unfamiliar threats that lurk in the shadows of the bright new digital age.

Here’s what participants are saying about this course:

Aditya J ( I Like, I Wish) :

This course does a great job in explaining why cybersecurity is required, and the consequences of neglecting it. This is probably one of the few courses which cover cybersecurity from the different points of view such as that of an end user, an organization and process automation in an industry.Eagerly awaiting the next course in the Thought Leaders series. Keep up the good work.

Mohamed Yosufdeen JMH (I Like, I Wish):

I like the way in which this course is structured, it is designed in such a way that there will not be any difficulty in understanding the concepts. (It starts from the very basic, and increases the technicality as required). I wish that this course should reach every individual, be it a student or a professional, so that they know what exactly are happening and the security issues in cyber world.

Course Characteristics

  • Starting from: November 11, 2015, 09:00 UTC (What does this mean?)
  • Duration: 2 weeks (4 - 6 hours per week), however the course is open for 4 weeks
  • Weekly assignments, both to be completed by December 10, 2015, 09:00 UTC
  • Course language: English
  • How is an openSAP course structured?

Course Content

  • Week 1: Digital World and Cybersecurity
  • Week 2: Cybersecurity in Context

This course is hosted by openSAP but the content is created and provided to you by Hasso Plattner Institute Potsdam,*

Target Audience

  • Students and business professionals
  • Anyone interested in the issues around cybersecurity in the digital age

Course Requirements

There are no formal requirements for this course.

*SAP accepts no responsibility for the content delivered in this course.

Course contents

  • Week 1:

    The Digital World and Cybersecurity
  • Week 2:

    Cybersecurity in Context
  • I Like, I Wish:

    We Love Your Feedback … And Want More

Reactivate this course

You can access all graded assignments and earn a Record of Achievement with openSAP, course reactivation option. Learn more or reactivate now!

Enroll me for this course

The course is free. Just register for an account on openSAP and take the course!
Enroll me now

This course was held from Nov 11, 2015 through Dec 10, 2015.

4274 learners were enrolled on day 1 of the course.

When the final exam ended, this number had increased to 5320.

10375 learners enrolled.

Certificate Requirements

  • Gain a record of achievement by earning more than 50% of the maximum number of points from all graded assignments.
  • Gain a confirmation of participation by completing at least 50% of the course material.

Find out more in the certificate guidelines.

This course is offered by

Prof. Dr. Christoph  Meinel

Prof. Dr. Christoph Meinel is scientific institute director and CEO of the Hasso Plattner Institute, where he heads the department for Internet Technologies and Systems. He lectures in IT systems engineering, supervises numerous doctoral projects, and is a teacher at the HPI School of Design Thinking. His research interests lie in security engineering, knowledge engineering, and Web 3.0. In addition to this, he is also academically involved in the area of design thinking.

Prof. Meinel is the (co-)author of 15 books and more than 500 publications in academic journals, a member of acatech, visiting professor at the Beijing University of Technology, and holds positions on many scientific boards and governing bodies.

Your request has been sent to our support team, and will be answered as soon as possible.

Thank You!

Oops something went wrong.

Back