We may earn an affiliate commission when you visit our partners.
Jonathan S. Weissman

In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Read more

In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

What you'll learn

  • Network and system administration fundamentals
  • Information assurance fundamentals such as confidentiality, integrity and availability, etc.
  • Basic cryptography concepts

What's inside

Learning objectives

  • Network and system administration fundamentals
  • Information assurance fundamentals such as confidentiality, integrity and availability, etc.
  • Basic cryptography concepts

Syllabus

Traffic lights

Read about what's good
what should give you pause
and possible dealbreakers
Core computing security concepts are effectively introduced with clarity
Provides a multi-modal learning experience by combining readings, videos, and discussions
Taught by recognized experts in the field
Outlines foundational and advanced topics in computing security
This course is part of a larger MicroMasters program, indicating a comprehensive approach to learning

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Reviews summary

Comprehensive introduction to cybersecurity fundamentals

According to learners, this course offers a solid foundation in cybersecurity fundamentals, covering a wide range of topics suitable for those seeking a comprehensive introduction. It is particularly well-suited for beginners with no prior knowledge in the field. However, students note that while the course provides broad coverage, it may lack depth in specific, advanced areas. Some also find aspects of the content challenging, especially topics like cryptography or certain assessments. Experienced individuals might find the material too basic.
Accessible for those new to the field.
"This course is perfect if you're starting in cybersecurity."
"I had no background and could follow along."
"It's designed well for absolute beginners."
Covers a wide array of cybersecurity areas.
"It's great how many different areas of cyber were introduced."
"The course covers a wide spectrum of topics."
"I got an overview of network, systems, crypto, and more."
Provides a solid base in cybersecurity concepts.
"I gained a strong understanding of key cyber concepts."
"This course built a solid foundation for me."
"It clearly explained the fundamental principles."
Some material or assessments can be difficult.
"Certain concepts, like cryptography, were hard to grasp."
"I found the quizzes quite demanding."
"Some parts required significant effort to understand."
May be too simple for experienced learners.
"If you have experience, much of this will be review."
"I didn't find much new here as an IT professional."
"Experienced people might want something more advanced."
May not go deep enough into specific subjects.
"Some topics felt like they were only briefly touched upon."
"I needed external resources for more depth in certain areas."
"It gave a good overview but lacked technical depth."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybersecurity Fundamentals with these activities:
Organize your course notes and materials
Organize your notes, assignments, and other course materials to prepare for studying and future reference.
Show steps
  • Create a filing system for your notes and materials.
  • Review your notes regularly and make any necessary additions or updates.
Read 'Cryptography and Network Security' by Behrouz A. Forouzan
Review a comprehensive text on cryptography and network security to reinforce your understanding of the concepts and techniques covered in the course.
Show steps
  • Read and summarize key chapters in the book.
  • Complete the exercises and practice questions.
Review network and system administration fundamentals
Review network and system administration fundamentals to strengthen your understanding of the foundational concepts in this field.
Show steps
  • Review basic networking concepts, such as IP addressing, routing, and switching.
  • Review basic system administration concepts, such as file permissions, user management, and software installation.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Participate in a study group
Engage with peers to discuss course concepts, share insights, and work on assignments together.
Show steps
  • Find a study group or create one with classmates.
  • Meet regularly to discuss course materials, work on assignments, and prepare for exams.
Follow tutorials on network security
Follow tutorials to learn about network security concepts, protocols, and tools.
Browse courses on network security
Show steps
  • Watch videos or read articles on network security topics.
  • Try out network security tools, such as packet sniffers and intrusion detection systems.
Practice cryptography problems
Solve cryptography problems to improve your understanding of cryptography concepts and techniques.
Browse courses on Cryptography
Show steps
  • Solve problems involving basic cryptography algorithms, such as Caesar cipher, Vigenere cipher, and AES.
  • Practice breaking simple ciphers.
Develop a security plan for a small business
Develop a security plan to apply your knowledge of computing security concepts and tools to a real-world scenario.
Browse courses on Security Planning
Show steps
  • Conduct a risk assessment to identify potential threats and vulnerabilities.
  • Develop security policies and procedures to mitigate risks.
  • Create a security plan that outlines how to implement and maintain the security measures.
Participate in a cybersecurity competition
Challenge yourself and test your skills by participating in a cybersecurity competition.
Show steps
  • Find a cybersecurity competition that aligns with your interests and skill level.
  • Form a team or participate individually.
  • Prepare for the competition by practicing and studying.
  • Participate in the competition and try to solve the challenges.

Career center

Learners who complete Cybersecurity Fundamentals will develop knowledge and skills that may be useful to these careers:
Security Architect
Security Architects are responsible for designing and implementing security measures to protect an organization's computer systems and networks. They work to ensure that the organization's security measures are aligned with the organization's business objectives, and that they are scalable and cost-effective. They also help to develop and implement security policies and procedures, and to ensure that the organization's security measures are compliant with relevant laws and regulations. This course can help you build a foundation in security architecture concepts and tools, and it can prepare you for a career as a Security Architect. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security measures to protect an organization's computer systems and networks. They work to prevent, detect, and respond to security threats, such as malware, hacking, and data breaches. They also help to ensure that the organization's information systems are in compliance with relevant laws and regulations. This course can help you build a foundation in security engineering concepts and tools, and it can prepare you for a career as a Security Engineer. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Information Security Analyst
An Information Security Analyst is responsible for designing and implementing security measures to protect an organization's computer systems and networks. They work to prevent, detect, and respond to security threats, such as malware, hacking, and data breaches. They also help to ensure that the organization's information systems are in compliance with relevant laws and regulations. This course can help you build a foundation in information security concepts and tools, and it can prepare you for a career as an Information Security Analyst. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Chief Information Security Officer (CISO)
The Chief Information Security Officer (CISO) is responsible for overseeing the organization's information security program. They work to develop and implement security policies and procedures, and to ensure that the organization's information systems are secure and compliant with relevant laws and regulations. They also help to manage the organization's security risks, and to respond to security incidents. This course can help you build a foundation in information security concepts and tools, and it can prepare you for a career as a CISO. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Penetration Tester
Penetration Testers are responsible for testing the security of computer systems and networks by simulating attacks. They work to identify vulnerabilities in the system that could be exploited by attackers. They also help to develop and implement security measures to protect the system from these vulnerabilities. This course can help you build a foundation in penetration testing concepts and tools, and it can prepare you for a career as a Penetration Tester. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Incident Responder
Incident Responders are responsible for responding to and resolving security incidents, such as malware attacks, hacking, and data breaches. They work to contain the damage caused by the incident, and to prevent it from happening again. They also help to investigate the incident and identify the attackers. This course can help you build a foundation in incident response concepts and tools, and it can prepare you for a career as an Incident Responder. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Security Consultant
Security Consultants are responsible for providing advice and guidance to organizations on how to improve their security posture. They work to assess the organization's security risks, and to develop and implement security measures to mitigate those risks. They also help to train the organization's employees on security best practices. This course can help you build a foundation in security consulting concepts and tools, and it can prepare you for a career as a Security Consultant. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Ethical Hacker
Ethical Hackers are responsible for testing the security of computer systems and networks by simulating attacks. They work to identify vulnerabilities in the system that could be exploited by attackers. They also help to develop and implement security measures to protect the system from these vulnerabilities. This course can help you build a foundation in ethical hacking concepts and tools, and it can prepare you for a career as an Ethical Hacker. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
IT Auditor
IT Auditors are responsible for evaluating and reporting on the effectiveness of an organization's IT controls. They work to ensure that the organization's IT systems are secure and compliant with relevant laws and regulations. They also help to identify and mitigate IT risks, such as security breaches and data loss. This course can help you build a foundation in IT auditing concepts and tools, and it can prepare you for a career as an IT Auditor. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Malware Analyst
Malware Analysts are responsible for analyzing malware to identify how it works and how to protect against it. They work to develop and implement anti-malware software, and to provide advice and guidance to organizations on how to protect themselves from malware attacks. This course can help you build a foundation in malware analysis concepts and tools, and it can prepare you for a career as a Malware Analyst. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Risk Analyst
Risk Analysts are responsible for assessing and managing risks to an organization's computer systems and networks. They work to identify, prioritize, and mitigate risks that could impact the organization's operations or reputation. They also help to develop and implement risk management plans. This course can help you build a foundation in risk analysis concepts and tools, and it can prepare you for a career as a Risk Analyst. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
System Administrator
System Administrators are responsible for managing and maintaining computer systems. They work to ensure that the systems are secure, reliable, and meet the needs of the organization's users. They also help to troubleshoot and resolve system problems. This course can help you build a foundation in system administration concepts and tools, and it can prepare you for a career as a System Administrator. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Computer Forensics Analyst
Computer Forensics Analysts are responsible for investigating and analyzing computer systems and networks to identify evidence of crimes. They work to recover and preserve digital evidence, such as emails, files, and logs. They also help to testify in court about their findings. This course can help you build a foundation in computer forensics concepts and tools, and it can prepare you for a career as a Computer Forensics Analyst. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Security Administrator
Security Administrators are responsible for managing and maintaining an organization's security systems and networks. They work to ensure that the organization's security systems are up-to-date and functioning properly. They also help to troubleshoot and resolve security problems. This course can help you build a foundation in security administration concepts and tools, and it can prepare you for a career as a Security Administrator. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Network Administrator
Network Administrators are responsible for managing and maintaining an organization's computer networks. They work to ensure that the network is secure and reliable, and that it meets the needs of the organization's users. They also help to troubleshoot and resolve network problems. This course can help you build a foundation in network administration concepts and tools, and it can prepare you for a career as a Network Administrator. The course covers topics such as cryptography, networking, systems administration, and malware analysis.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybersecurity Fundamentals.
Provides a useful overview of memory forensics, useful as supplemental reading.
Provides a good overview of network security assessment techniques.
Provides a good introduction to using Metasploit for penetration testing.
Provides documentation on how to use Kali Linux, a useful tool in cybersecurity.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser