Cyber Security

Cyber Security and Technology


8 Weeks


Learn to identify social media problems that need to be practised and the various approaches to practise cybersecurity.


This course will assist and guide you in understanding what cyber security is and the various approaches to practice cyber security. Learn to identify cyber security challenges and the main gaps and strategies taken around the world, and the importance of cyber security for business and social media.

Subject Matter Expert

Carl Heinz Uys’s vision is a safer connected world, his mission in life is to contribute towards safeguarding cyberspace. He has been an entrepreneur since 1999. Carl is a qualified information technology engineer and cyber security practitioner and has gained 10 years’ experience in computer and communication science. He is also a third-year law student and has acquired skills in strategic management, people development, policy development, research and report writing. Amongst other public interest cyber security projects, Carl was part of a team that contributed towards reducing the financial fraud within the provincial government of Kwa-Zulu Natal. He was also a member of the team who was responsible for cyber security during the 2014 South African national government elections. He is currently a cyber security practitioner working within various industries across the globe.

Course and Technical Requirements


To successfully access and complete this course, you will be required to have a registered email account, access to a computer/laptop/tablet and stable internet connection. You will be required to be familiar with using a computer as you may need to be able to read and download documents in Adobe PDF Reader, view Microsoft PowerPoint presentations, and read and create documents in Microsoft Word.


Our online short learning programmes may require additional software applications. These additional software applications requirements will be communicated to you in this information pack and/or on the website course page. UNi4 Online does not provide any additional software applications required for online short learning programmes.

Please note: Google, YouTube and Vimeo may be used in our online course delivery. If any of these services are blocked in your jurisdiction, you may have difficulty in accessing our course content

Learning Approach

Our online short learning programmes are broken into self-paced manageable modules designed to be interactive and engaging:

  • The programme is available to be viewed on smart devices and includes mobile, tablets and personal computers.
  • Relevant case studies, articles and recommended reading are part of supplementary resources available.
  • Apply and evaluate what you have learned in each module with the self-grading quizzes and assignment submissions.
  • View a range of introductory course videos by your Subject Matter Expert.
  • Scheduled live webinars are included with the Online Academic Tutor.
  • Network, collaborate and interact with your fellow participants and Online Academic Tutor via the discussion forum.


Upon successful completion of this online short learning programme, you will be awarded with a UNi4 Online Certificate of Completion.

Learning Objectives

Your dedicated Online Academic Tutor (OAT) will provide you with necessary guidance, offer advice and answer questions on course content, to help you achieve academic success.


  • MODULE 0 | Week 1 OrientationNavigating the Virtual Learning Environment
  • MODULE 1 | Week 2 The History of CyberspaceUnderstand what cyberspace is today, and what it could look like tomorrow
  • MODULE 2 | Week 3 What is Cyber Security?Comprehending what cybersecurity is all about
  • MODULE 3 | Week 4 Global Guidelines for Cyber SecurityUnderstanding global efforts to improve cybersecurity
  • MODULE 4 | Week 5 Cyber Security for Foundational Business DomainsIdentify foundational domains and explain why these domains are considered foundational
  • MODULE 5 | Week 6 Cyber Security for the Process DomainUnderstand what cyber security measures must be catered for within processes in an organisation
  • MODULE 6 | Week 7 Cyber Security and Social MediaThe potential impact of exposing sensitive information on social media
  • MODULE 7 | Week 8 Cyber Security Career PathFocus on the need for cyber security skills globally
  • MODULE 8 | Week 9 Wrap-upSynthesise learning journey experience and evaluate the course

Payment options available to you

Need more information about this course?

Complete the fields below to receive the course information pack.

    By providing us with your contact details, you agree to the use of your data as described in our terms and conditions to receive communications. You may opt out of receiving communications at any time.