CYBER COMPASS

Secure guide to the digital world 

Guide me

Welcome to the unique course on cybersecurity!

Locking a door every morning. Always keeping your wallet safe. Managing life and liability insurance. We live our lives cautiously because everyone keeps thinking, “what if...”. But what happens when it comes to digital technologies?


On the contrary, we throw caution away in the digital world or we try to avoid technology altogether. However, there is a better way, which involves recognizing that cybersecurity is a life skill that will enable you to:

No description

Take control

Gain confidence and self-assurance in the cyber world and prepare for an inevitably digital future.

No description

Be better at what you do

Acquire practical tools for the 21st century and a solid foundation to explore digital opportunities.

No description

Live more comfortably

Avoid inconveniences more easily, simplify many tasks, and protect yourself and your loved ones better.

Cyber compass is not a university textbook. It is a deliberately minimalist course designed to provide practical advice and a safe direction toward the possibilities of the digital world, the world we live in.

No description

Lessons content and structure

  • At the beginning of each module, you will learn what we have prepared for you.
  • We recommend going through our open course sequentially, as the modules often build on each other.
  • In the final module, you will find a summary that you can print and refer to during moments of uncertainty.

No description

 Fifteen minutes of your time

  • The course consists of five modules.
  • Each module takes about fifteen minutes to read.
  • They include small challenges and more time-consuming guides, with their time allocation indicated at the beginning of each section with this icon.

What will you learn in our course?

We have selected practical information and prepared understandable guides to help you take responsibility for yourself in the cyber environment. Invest in yourself and acquire skills that universities, employers, and especially you will truly appreciate and utilize. From now on, it’s up to you!

No description

How not to get tricked in cyberspace?

Humans are fallible, and that’s perfectly okay. However, in cyberspace, this is a trait that attackers most frequently exploit, as confirmed by our team's experience. You will learn how to recognize and defend against the manipulative technique of phishing in the first module.

Phishing

No description

How properly are your treasures guarded?

It’s the passwords that protect your (online) identities, valuables, and data. In the second module, you will learn how to create a passphrase (the strongest yet easiest to remember), how to handle passwords, and discover the practicality of a password manager which streamlines the way you handle passwords.

passwords

No description

What if someone gets your password?

That’s when multi-factor authentication comes in, a backup digital parachute you don’t want to risk going without. For you, it means greater security, and for attackers, a significant obstacle. In the third module, you will learn about the methods you can use for authentication and how to practically implement them.

MFA

No description

How to create an effective defense from small things?

The boundary between your online and offline world is blurring, so why use a double standard for security?
It’s time to give all digital devices the appropriate care. We will clearly cover antiviruses, updates, backups, screen locking, and much more in the fourth module to keep your devices secure. 

Security of devices

No description

How to better protect your privacy?

Your privacy and data are valuable. It makes sense to protect them. Everything starts with conscious control of your digital footprint, especially on social media. It is also good to be aware of the benefits of encrypted communication and to know the significance of VPN tools. You will learn about all of this in our fifth module.

SECURE CONNECTION

No description

Not saying goodbye: the journey doesn’t end here

It’s challenging to start thinking differently about many things. Therefore, we have a few things for you at the end. One of them is the Cyber Cheatsheet, which is a summary of what you learned in the course. You can print it and use it as a guide to return to all course modules. It’s simply a tool for your safe direction.  

CYBER CHEATSHEET

Who is behind the course?

People from the whole Masaryk University contributed to making this course awesome. Don't expect tech geek language – the Cyber Compass was created not just by IT professionals, but also by designers, learning specialists, and copywriters.

🟡
We made sure the course is understandable to the broad academic community: from a first-year student finding their way, to a lecturer with ten years of experience, to busy registrars.

🟡
But that doesn’t change the fact that you can rely on the content: contrary to random articles or recommendations (and equally often, fatal mistakes) posted online, you will always find up-to-date and verified information in this course.

🟡 
Every single hint, suggestion, or tutorial was reviewed multiple times by specialists from CSIRT-MU cybersecurity team (Institute of Computer Science at Masaryk University), but also by external consultants.

Course Authors

 

Mgr. et Mgr. MARTIN HORÁK

Martin, the brain of the whole course with a knowledge base in cybersecurity, law, service design, and many other areas, focused not just on managing the course development, but also on technical content.


 

Mgr. DÁVID MAGUŠIN

Dávid primarily focuses on user needs analysis and the subsequent preparation of educational materials. His goal is to enhance users' cybersecurity in the way they most prefer. With his knowledge in Security and Strategic Studies, he perceives new trends and the broader context, which he utilizes when updating the course.



 

Mgr. PAVEL BREJCHA

Pavel is also a graduate of Security and Strategic Studies and currently focuses on preparing educational courses, popular articles, and teaching. He engages in similar activities at Fakescape, focusing on media literacy and cybersecurity. This allows him to bring new impulses to Kyberkompas and, along with Dávid, take care of its updates.


 

RNDr. VÍT RUSŇÁK, Ph.D.

Víťa leads the Awareness and training group within Masaryk University's Cybersecurity Team. He ensures the course's long-term direction is consistent with the strategic objectives of the Institute of Computer Science. He is also the uncompromising slayer of bad ideas.


 

Mgr. et Mgr. HANA MATĚJKOVÁ

Hanka combined her knowledge of pedagogy, online learning design, and copywriting to create a user-friendly (readable, understandable, and neat) learning experience; therefore, she was responsible for creating the form of the Cybercompass.


 

Bc. PETRA MIKULOVÁ

Petra has been focusing on cyber-education for quite some time. Petra especially ensured that no tricky question was left unanswered and unexplained in a way appropriate to the needs of learners.


 

RNDr. JAN VYKOPAL, Ph.D.

Jan teaches cybersecurity and explores how to teach it better. In this course, he was the key contributor of expert knowledge – from choosing the type and structure of instructions to their usability for the general user.


 

PhDr. PAVLA VIZVÁRY​​, Ph.D.

Pavla is a specialist in cybersecurity and online education. She reflected the ideas of the team and led it to precise the content and form of the course.


 

CSIRT-MU CYBERSECURITY TEAM EXPERTS

CSIRT-MU team members continuously improved the course, primarily its technical aspects. So, they guarantee the quality of the content that you can dive into in just a few seconds.

 

We wish you that acquiring self-confidence and awareness in cyberspace will bring you nothing but joy.

Last update: 8. 7. 2024

You are running an old browser version. We recommend updating your browser to its latest version.

More info