返回到 Introduction to Computer Security
University of London

Introduction to Computer Security

The purpose of this short four-week course is to introduce the topic of computer system security. We initially look at a short basic introduction to computer system core components and functions and then extend this to consider a variety of topics from hardware to applications. Throughout we provide pointers to openly available materials for background and further reading to explore the topics. We refer to the Cyber Security Body of Knowledge (CyBOK) as a reference for cyber security knowledge, alongside other sources that are widely available. In total, we have four weeks that cover this introduction to computer systems and security. No prior programming nor advanced mathematical knowledge Is required. There are a few examples of pseudocode and some basic computer logic (AND, OR, XOR, etc.) in our Week 1 Introduction to computer systems, but these are not essential to completing the course. In other lessons, we introduce basic concepts and provide pointers to online resources. The course includes active learning through four lab sessions. The first lab introduces the Linux operating system in general by exploring the Linux desktop and applications provided in the Coursera lab environment hosted in the AWS cloud. The second lab looks at the Linux command line and explores some of the file system and gathers system information, for example to explore processes. The third lab explores the network information, the system connectivity, and uses some Python scripts and Wireshark to examine the TCP and UDP transport protocols and the web/HTTP application protocol. Lastly we explore more about the network services using the Nmap tool to explore the network services in the system. The course is designed to provide a wide introduction to computer security, by outlining computer systems, including the operating system, programs, data and networking. We discuss some of the issues in computer security and introduce some of the vulnerabilities and threats as we progress through the four weeks. We include some optional readings and videos from a number of sources, including professional resources and vendor materials for additional study.

状态:Virtual Private Networks (VPN)
状态:Authorization (Computing)
初级课程小时

精选评论

TZ

5.0评论日期:Feb 4, 2025

Covers all fundamentals very well in the time given; however, should expand on cloud & software defined networks in future

所有审阅

显示:12/12

JOMAR PIMENTEL
5.0
评论日期:Dec 22, 2024
Alexandru Micu
5.0
评论日期:Oct 27, 2024
Jean Oliveira
5.0
评论日期:Nov 24, 2025
Thomas Zwicker
5.0
评论日期:Feb 5, 2025
Valdir Castaldelli Jr
5.0
评论日期:Feb 4, 2025
Gilles Béliveau
5.0
评论日期:Feb 25, 2025
Earningstone R Sangma
5.0
评论日期:Jun 27, 2025
Shaniki Smith
5.0
评论日期:Dec 9, 2024
Mary ann
5.0
评论日期:Feb 13, 2025
Miguel Ratao
5.0
评论日期:Aug 28, 2024
Kandice Simons
1.0
评论日期:Feb 11, 2024
Rinat Shaberdiyev
5.0
评论日期:Jan 7, 2026