We may earn an affiliate commission when you visit our partners.
Course image
Arosha K. Bandara, Terry Burbidge, and Peter Thomson

Topics Covered

Read more

Topics Covered

  • Threat landscape: terminology, cyber security threats, keeping up to date
  • Authentication: access control, passwords, two-factor authentication
  • Malware: types of malware, attack vectors, preventing infection
  • Networking and communications: fundamentals, security challenges, standards
  • Cryptography: symmetric and asymmetric cryptography, applications
  • Network security: firewalls, virtual private networks, intrusion detection / prevention
  • When your defences fail: cyber security laws, recovering from attacks
  • Managing security risks: risk analysis and management

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Save this course

Save Introduction to Cyber Security to your list so you can find it easily later:
Save

Reviews summary

Cybersecurity fundamentals

This course introduces learners to fundamental cybersecurity concepts. It strikes a balance between beginner-friendly content and opportunities for technical exploration. Learners with any level of experience are likely to find this course enjoyable.
Weekly quizzes instead of a final exam.
"Weekly tests instead of one large test at the end of the course also helped balance the pace of the course."
Connects cybersecurity concepts to real-world events.
"Encouraging real-world research on past infosec events made the course feel relevant and connected to industry."
Provides opportunities to delve into cybersecurity topics.
"Entry level information security concepts were balanced with opportunities to dive more deeply into the technical aspects of work in cybersecurity."
Accessible introduction to essential cybersecurity concepts.
"The course does not assume any prior knowledge of computer security and can be enjoyed by anyone interested in improving the security of their digital information."

Activities

Coming soon We're preparing activities for Introduction to Cyber Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Introduction to Cyber Security will develop knowledge and skills that may be useful to these careers:

Reading list

We haven't picked any books for this reading list yet.
For those interested in cloud security, this book provides a comprehensive overview of the challenges and best practices specific to cloud environments. It covers topics such as cloud architecture, data protection, and compliance.
Provides a comprehensive introduction to cyber security, covering a wide range of topics, including network security, ethical hacking, and incident response. It is suitable for both beginners and experienced professionals.
For readers interested in delving deeper into the analysis of malware, this book offers a comprehensive guide to the techniques and tools used by security professionals. It provides valuable insights into the behavior and detection of malicious software.
This framework developed by NIST provides a set of guidelines and best practices for managing and reducing cyber security risks. It is essential reading for anyone involved in cyber security policy and implementation.
This comprehensive guide provides a holistic overview of cyber security, covering both theoretical concepts and practical implementation strategies. It is an excellent resource for anyone seeking a foundational understanding of the field.
For those interested in exploring the practical aspects of cyber security, this book offers a hands-on approach. It guides readers through real-world scenarios and demonstrates how to use Python for various cyber security tasks.
This textbook offers a comprehensive treatment of cyber security principles and practices. It covers various aspects of cyber security, including risk management, incident response, and cloud security.
This textbook provides a rigorous and comprehensive treatment of cryptography and network security. It is an excellent resource for students and researchers interested in the mathematical foundations of cyber security.
For readers interested in a more theoretical approach, this book explores the mathematical foundations of cyber threats and countermeasures. It provides a rigorous treatment of cryptography and network security.
This textbook provides a comprehensive overview of the fundamental principles of information security. It valuable resource for students and professionals seeking a solid foundation in the field.
This book, written by a renowned hacker and security expert, explores the human element of cyber security. It provides insights into social engineering and deception techniques used by attackers and offers strategies for mitigating these threats.
Provides a broad overview of computer networking, including a chapter on network security. It good resource for anyone who wants to understand the basics of network security.
Provides a practical guide to network security. It good resource for anyone who wants to learn how to protect their networks from hackers.
Provides a practical guide to network security assessment. It good resource for anyone who wants to learn how to assess the security of their networks.
Provides a practical guide to using OpenSSL for network security. It good resource for anyone who wants to learn how to use OpenSSL to secure their networks.
Provides a comprehensive overview of cryptography and network security. It good resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of network security. It good resource for anyone who wants to learn more about network security and how to protect their networks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Introduction to Cyber Security.
Unlocking Information Security I: From Cryptography to...
Most relevant
The Complete Cyber Security Course : Hackers Exposed!
Most relevant
The Absolute Beginners Guide to Cyber Security 2024 -...
Most relevant
The Cyber Security Landscape
Most relevant
Security Operations
Most relevant
The Complete Cyber Security Course : End Point Protection!
Most relevant
Palo Alto Networks Cybersecurity Foundation
Most relevant
Cyber Security Basics: A Hands-on Approach
Most relevant
Introduction to Cybersecurity for Teachers
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser