Coursera
Coursera Logo

Introduction to Computer Security 

  • Offered byCoursera

Introduction to Computer Security
 at 
Coursera 
Overview

Duration

41 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Introduction to Computer Security
 at 
Coursera 
Highlights

  • Shareable Certificate
    Flexible deadlines
    Coursera Labs
Details Icon

Introduction to Computer Security
 at 
Coursera 
Course details

More about this course
  • The purpose of this short four-week course is to introduce the topic of computer system security
  • Learner initially look at a short basic introduction to computer system core components and functions and then extend this to consider a variety of topics from hardware to applications
  • Throughout learner provide pointers to openly available materials for background and further reading to explore the topics
  • In total, the course cover introduction to computer systems and security
  • The course is designed to provide a wide introduction to computer security, by outlining computer systems, including the operating system, programs, data and networking
  • The course will discuss some of the issues in computer security and introduce some of the vulnerabilities and threats as progress through the four weeks
Read more

Introduction to Computer Security
 at 
Coursera 
Curriculum

Introducing computer systems and security

Introduction to computer security

Computers, data and programs

An introduction to the operating system

The stream cipher

Week 1 summary

Course overview and study guide

Week 1 introduction

An overview of computer systems and security

Activity – Create a list of security terms and definitions

Computers and data

The operating system and its functionality

Data representation and manipulation

Reflection on Week 1

Week 1 further reading

Introducing computer systems and security

Computers and data

Data representation and storage

Week 1 test

Computer architecture and operating systems

Week 2 introduction

Introduction to layered models of computer systems

Extending our layered model of computer systems

Personal computer systems architecture

Computer input/output

Operating systems security

Week 2 summary

Introduction to Week 2

A layered representation of a computer system

Computer security terminology

Security design principles

An introduction to personal computer systems architecture

Modern operating systems

Virtualisation

Program/software classification

Exploring the Windows 11 operating system

Optional – Modern operating system: requirements for hardware security

Week 2 reflection

Additional resources

Layered models

Computer security design principles

Personal computer architecture

Operating systems, virtualisation and software

Week 2 test

Operating systems control, authentication, authorisation and accounting

Week 3 introduction

An introduction to authentication

Authorisation

Computer systems control

Accounting

Week 3 summary

Introduction to Week 3

Authentication and authorisation

Authentication – passwords, tokens, biometrics and policy

Authentication – further reading

Authorisation and access control

Computer system control

Control mechanisms

Authorisation, access control and accounting

Access control models

Accounting – Monitoring usage and events

Application control

Further reading – Modern operating system: application security

Week 3 reflection

Additional resources

Authentication mechanisms

Computer control overview

Access control and accounting

Applications and control

Week 3 test

Computer systems and networking

Week 4 introduction

Computer networks and security

Networks and network equipment

Network security - Threats and vulnerabilities

Network security devices

The DMZ and network zones

Network authentication protocols

Computer systems security – threats and vulnerabilities

Course review and where next

Introduction to Week 4

Network technologies and computer systems

Network protocols

An introduction to network authentication

Network authentication protocol patterns

Computer system vulnerabilities

Computer system security

Application case study – the web browser

The computer, the browser and digital fingerprints

Introduction to attack surface, CVE, CWE and CVSS

Week 4 reflection

Additional resources

Computer networking

Computer network threats and vulnerabilities

Computer network security

Network protocols

Network authentication

Threats and vulnerabilities

Week 4 test

Introduction to Computer Security
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Introduction to Computer Security
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...