University of Colorado Boulder

Basic Ideas in Computing Security

University of Colorado Boulder

Basic Ideas in Computing Security

Ahmed M. Hamza

位教师:Ahmed M. Hamza

访问权限由 New York State Department of Labor 提供

深入了解一个主题并学习基础知识。
初级 等级

推荐体验

7 小时 完成
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级

推荐体验

7 小时 完成
灵活的计划
自行安排学习进度

您将学到什么

  • You will learn how to use prominent sources of cyber threat intelligence in the open source domain to identify current threats and prioritize action.

  • You will learn what the basic working terminology is in computing security, and how to analyze vulnerability disclosures and their impact.

  • You will study authorization mechanisms as applied to Unix, and use them to set and change permission access levels on a modern operating system.

要了解的详细信息

可分享的证书

添加到您的领英档案

作业

6 项作业

授课语言:英语(English)
最近已更新!

March 2026

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有4个模块

An introduction to the world of cybersecurity terminology, objectives, and the contrast between vulnerabilities/bugs and weakness enumeration in the security community. Learn how vulnerabilities are scored using objective, quantitative measures of impact.

涵盖的内容

4个视频4篇阅读材料1个作业

Discover what organizations keep track of known, actively exploited vulnerabilities and malware campaigns, and how to use that information to make decisions affecting critical systems. We discuss how prioritization is not always a simple quantitative procedure. Also find out how to use public tools to quickly check any un-trusted files, URLs, and file signatures against hundreds of anti-malware engines and community notes.

涵盖的内容

2个视频1篇阅读材料2个作业

What are the main factors of authentication based on? What is multi-factor authentication, and how does it relate to authentication protocols? How can authentication factors be vulnerable even when based on advanced tech?

涵盖的内容

3个视频2篇阅读材料2个作业

Maintaining access control is a critical feature of security and a driving force of all cryptographic systems. Here we explore two basic forms of authorization models (Mandatory and Discretionary), and dive into the world of Unix filesystem access control as an example of the latter.

涵盖的内容

3个视频1个作业1个非评分实验室

位教师

Ahmed M. Hamza
University of Colorado Boulder
4 门课程3,492 名学生

提供方

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'

从 Computer Science 浏览更多内容