Skip to Main Content
University of Detroit Mercy logo

Cybersecurity & Information Systems: Open Educational Resources

Open Educational Resources

Open Educational Resources are freely accessible educational resources that can be used, re-mixed, and altered for educational purposes.  They can include full courses, parts of courses, videos, handouts, tutorials, etc...

The Open Education Consortium is a global, non-profit consortium of educational institutions that advocates for global open education.  Its website includes news and information on recent initiatives. 

SPARC is another global coalition that advocates for open education, open access, and open data.  Its website includes background information on open initiatives as well as news on recent legislation.

Free Government Resources

U.S. government works are not restricted by copyright, and there are many resources that may be useful for instructors.

Open Access Courses, Assignments, and Learning Objects

Free Online Books

A 21st Century Cyber-Physical Systems Education

A 21st Century Cyber-Physical Systems Education

Examines the intellectual content of the emerging field of CPS ("engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components." )and its implications for engineering and computer science education.

Security of Networks and Services in an All-Connected World

Security of Networks and Services in an All-Connected World

Explore anomaly detection, artificial intelligence, cloud computing, data security, cyber crime, and network security.

Cyber Security

Cyber Security

Covers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security..

Software Update As a Mechanism for Resilience and Security

Software Update As a Mechanism for Resilience and Security

Explores software update as an important mechanism by which security changes and improvements are made in software, as well as related practices, mechanisms, policies, and technologies.

Preparing for Digital Disruption

Preparing for Digital Disruption

Discusses several specific policy measures government and businesses should take in order to be better prepared to deal with a digital disruption and prevent further escalation.

Cybersecurity of Digital Service Chains

Cybersecurity of Digital Service Chains

Presents the scientific results from the H2020 GUARD project that aimed to fill the gaps between software management paradigms and cybersecurity models.

The Ethics of Cybersecurity

The Ethics of Cybersecurity (eBook)

Cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. This book discusses theories, problems and solutions on the relevant ethical issues involved.

Cyber Security of Critical Infrastructures

Cyber Security of Critical Infrastructures

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries.This book addresses cybersecurity training, malware analysis techniques, ransomware attacks and maturity assessment frameworks.

Implications of Artificial Intelligence for Cybersecurity

Implications of Artificial Intelligence for Cybersecurity

Addresses the significant concern among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity.

Computer Security Threats

Computer Security Threats

Explores research frontiers in computer security with algorithms and implementation details for use in the real world,including deep learning, artificial intelligence data mining and visualization.

Advanced Topics in Systems Safety and Security

Advanced Topics in Systems Safety and Security

Discusses various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation

Videos