University of Opole - Central Authentication System
Strona główna

Internet safety

General data

Course ID: KZ-O-03-02-000006
Erasmus code / ISCED: 11.3 The subject classification code consists of three to five digits, where the first three represent the classification of the discipline according to the Discipline code list applicable to the Socrates/Erasmus program, the fourth (usually 0) - possible further specification of discipline information, the fifth - the degree of subject determined based on the year of study for which the subject is intended. / (0612) Database and network design and administration The ISCED (International Standard Classification of Education) code has been designed by UNESCO.
Course title: Internet safety
Name in Polish: Bezpieczny internet
Organizational unit: Institute of Physics
Course groups: (in Polish) Kursy zmienne ogólnouczelniane ogólne
(in Polish) Przedmioty ogólnouczelniane do wyboru (studia stacjonarne)
ECTS credit allocation (and other scores): 2.00 Basic information on ECTS credits allocation principles:
  • the annual hourly workload of the student’s work required to achieve the expected learning outcomes for a given stage is 1500-1800h, corresponding to 60 ECTS;
  • the student’s weekly hourly workload is 45 h;
  • 1 ECTS point corresponds to 25-30 hours of student work needed to achieve the assumed learning outcomes;
  • weekly student workload necessary to achieve the assumed learning outcomes allows to obtain 1.5 ECTS;
  • work required to pass the course, which has been assigned 3 ECTS, constitutes 10% of the semester student load.

view allocation of credits
Language: Polish
Type of course:

general courses

Supplementary literature:

(in Polish) Nick Ioannou, "Internet Security Fundamentals: Practical Steps To Increase Your Online Security"


Kevin Mitnick, "Duch w sieci"


Christopher Hadnagy, "Socjotechnika"


Wojciech Orliński, "Internet. Czas się bać."

Short description:

Is the Internet a safe place? – definitely not, but you don’t necessarily need to be an easy target/low-hanging fruit for hackers. By acquiring some knowledge and learning some rules you can definitely improve your safety level.

The purpose of this course is to teach you how the Internet works and about its intrinsic vulnerabilities. It will show you what you shouldn’t do, and offer a short explanation of why it is dangerous. For example, it will be explained why it is compulsory to use so many different passwords, how to create a good password and why even a very strong password could be not a sufficient measure against criminals.

Full description:

Is the Internet a safe place? – definitely not, but you don’t necessarily need to be an easy target/low-hanging fruit for hackers. By acquiring some knowledge and learning some rules you can definitely improve your safety level.

The purpose of this course is to teach you how the Internet works and about its intrinsic vulnerabilities. It will show you what you shouldn’t do, and offer a short explanation of why it is dangerous. For example, it will be explained why it is compulsory to use so many different passwords, how to create a good password and why even a very strong password could be not a sufficient measure against criminals.

The course is divided into fifteen, short lectures, and each of them is associated with a few test questions. A database of those questions will be applied for the final assessment (also in form of a test).

Bibliography:

• Leo A. Notenboom, "(The ASK LEO! Guide to) Staying Safe on the Internet"

• Nick Ioannou, "Internet Security Fundamentals: Practical Steps To Increase Your Online Security"

• Bruce Schneier, "Secrets & Lies"

• Christopher Hadnagy, "Social Engineering",

• Kevin Mitnick, "Ghost in the Wire"

Learning outcomes:

Knowledge:

K_W1. Know the basics of the Internet structure.

K_W2. Know the structure of the e-mail header, and know which its parts can be easily forged.

K_W3. Know how the www/Internet webpage works.

K_W4. Know the categories of malware and how to protect against it..

K_W5: Know the basic social engineering techniques commonly used by criminals.

Skills:

K_U1: Can create sufficiently complex and various passwords.

K_U2: Can read the e-mail header and identify information about its sender.

K_U3: Can identify risky links.

K_U4: Can recognise attempt of attack with use of the social engineering. .

Social competence

K_K1: Know the importance of protecting of himself for the protection of friends and co-workers (e.g. in the local subnet).

K_K2: Is aware of the constant progress in Internet content as well as in criminal methods and techniques.

Assessment methods and assessment criteria:

Final test.

Classes in period "Winter semestr 2024/2025" (past)

Time span: 2024-10-01 - 2025-02-28
Selected timetable range:
Go to timetable
Type of class:
Lecture, 15 hours, 120 places more information
Coordinators: Ireneusz Książek
Group instructors: (unknown)
Students list: (inaccessible to you)
Credit: Course - Grading
Lecture - Grading

Classes in period "Summer semestr 2024/2025" (in progress)

Time span: 2025-03-01 - 2025-09-30
Selected timetable range:
Go to timetable
Type of class:
Lecture, 15 hours, 120 places more information
Coordinators: Ireneusz Książek
Group instructors: Ireneusz Książek
Students list: (inaccessible to you)
Credit: Course - Grading
Lecture - Grading

Classes in period "Winter semestr 2025/2026" (future)

Time span: 2025-10-01 - 2026-02-28
Selected timetable range:
Go to timetable
Type of class:
Lecture, 15 hours, 120 places more information
Coordinators: Ireneusz Książek
Group instructors: Ireneusz Książek
Students list: (inaccessible to you)
Credit: Course - Grading
Lecture - Grading
Course descriptions are protected by copyright.
Copyright by University of Opole.
pl. Kopernika 11a, 45-040 Opole https://uni.opole.pl contact accessibility statement site map USOSweb 7.1.2.0-www4-4 (2025-05-14)