Introduction to Computer Security
- Offered byCoursera
Introduction to Computer Security at Coursera Overview
Duration | 41 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Introduction to Computer Security at Coursera Highlights
- Shareable Certificate
Flexible deadlines
Coursera Labs
Introduction to Computer Security at Coursera Course details
- The purpose of this short four-week course is to introduce the topic of computer system security
- Learner initially look at a short basic introduction to computer system core components and functions and then extend this to consider a variety of topics from hardware to applications
- Throughout learner provide pointers to openly available materials for background and further reading to explore the topics
- In total, the course cover introduction to computer systems and security
- The course is designed to provide a wide introduction to computer security, by outlining computer systems, including the operating system, programs, data and networking
- The course will discuss some of the issues in computer security and introduce some of the vulnerabilities and threats as progress through the four weeks
Introduction to Computer Security at Coursera Curriculum
Introducing computer systems and security
Introduction to computer security
Computers, data and programs
An introduction to the operating system
The stream cipher
Week 1 summary
Course overview and study guide
Week 1 introduction
An overview of computer systems and security
Activity – Create a list of security terms and definitions
Computers and data
The operating system and its functionality
Data representation and manipulation
Reflection on Week 1
Week 1 further reading
Introducing computer systems and security
Computers and data
Data representation and storage
Week 1 test
Computer architecture and operating systems
Week 2 introduction
Introduction to layered models of computer systems
Extending our layered model of computer systems
Personal computer systems architecture
Computer input/output
Operating systems security
Week 2 summary
Introduction to Week 2
A layered representation of a computer system
Computer security terminology
Security design principles
An introduction to personal computer systems architecture
Modern operating systems
Virtualisation
Program/software classification
Exploring the Windows 11 operating system
Optional – Modern operating system: requirements for hardware security
Week 2 reflection
Additional resources
Layered models
Computer security design principles
Personal computer architecture
Operating systems, virtualisation and software
Week 2 test
Operating systems control, authentication, authorisation and accounting
Week 3 introduction
An introduction to authentication
Authorisation
Computer systems control
Accounting
Week 3 summary
Introduction to Week 3
Authentication and authorisation
Authentication – passwords, tokens, biometrics and policy
Authentication – further reading
Authorisation and access control
Computer system control
Control mechanisms
Authorisation, access control and accounting
Access control models
Accounting – Monitoring usage and events
Application control
Further reading – Modern operating system: application security
Week 3 reflection
Additional resources
Authentication mechanisms
Computer control overview
Access control and accounting
Applications and control
Week 3 test
Computer systems and networking
Week 4 introduction
Computer networks and security
Networks and network equipment
Network security - Threats and vulnerabilities
Network security devices
The DMZ and network zones
Network authentication protocols
Computer systems security – threats and vulnerabilities
Course review and where next
Introduction to Week 4
Network technologies and computer systems
Network protocols
An introduction to network authentication
Network authentication protocol patterns
Computer system vulnerabilities
Computer system security
Application case study – the web browser
The computer, the browser and digital fingerprints
Introduction to attack surface, CVE, CWE and CVSS
Week 4 reflection
Additional resources
Computer networking
Computer network threats and vulnerabilities
Computer network security
Network protocols
Network authentication
Threats and vulnerabilities
Week 4 test