We may earn an affiliate commission when you visit our partners.
Course image
Jonathan S. Weissman

In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

Read more

In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

What you'll learn

  • Network and system administration fundamentals
  • Information assurance fundamentals such as confidentiality, integrity and availability, etc.
  • Basic cryptography concepts

What's inside

Learning objectives

  • Network and system administration fundamentals
  • Information assurance fundamentals such as confidentiality, integrity and availability, etc.
  • Basic cryptography concepts

Syllabus

Unit 0: Getting Started Unit 1: Computing Security Concepts and Problems 1 Unit 2: Computing Security Concepts and Problems 2 Unit 3: Cryptography Unit 4: Networking 1 Unit 5: Networking 2 Unit 6: Systems Administration Unit 7: Detection and Prevention Unit 8: Malware and Forensics Unit 9: Conclusion​​

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Core computing security concepts are effectively introduced with clarity
Provides a multi-modal learning experience by combining readings, videos, and discussions
Taught by recognized experts in the field
Outlines foundational and advanced topics in computing security
This course is part of a larger MicroMasters program, indicating a comprehensive approach to learning

Save this course

Save Cybersecurity Fundamentals to your list so you can find it easily later:
Save

Reviews summary

Cybersecurity fundamentals

According to learners, Cybersecurity Fundamentals is well taught and well organized. Jonathan Weissman's lectures are easy to follow and he makes the concepts easy to understand. The course content is well thought out, the course readings are interesting, and the activities are challenging. Students say this course is a great introduction to cybersecurity, especially for those with non-IT backgrounds.
Instructor Weissman is engaging and his lectures are outstanding.
"This was a great course! Professor Weissman explained everything so perfectly! Thank you so much for everything!"
"Professor Weissman is the master of cybersecurity! The course was outstanding and he even connects with you on social media!"
"The Best Online Teacher that I have met so far is Jonathan S Weissman. He makes the course so interesting and appealing to the students."
The course is well organized and the content is well thought out.
"Amazingly organized, excellently presented, and great content."
"This has been a great course. It is a great introductory course...I learned several concepts I was not fully aware of."
"It was well structured and it was presented with a great deal of passion and wonderful explanations with a lot of examples to get one's understanding."
The lectures are easy to follow and the concepts are easy to understand.
"This was a beautiful course and i like it very much i was also very interested in cyber security and i think this was a best plateform."
"I really enjoyed all the learning material and specially the animations. I look forward to continuing learning about this amazing world of Cybersecurity."
"Complex topics explained in an easy, interesting and understandable way."
The assessments are lacking and do not adequately test understanding.
"The content is interesting for the most part, but I felt that the assessments were lacking."
"You watch the lectures, read stuff...and do activities, but the exams hardly test your understanding."
"Most of the questions are the easy "what" type of questions, and barely go any deeper than that."
The course assumes students have some prior knowledge of cybersecurity.
"A good introduction course if you're coming to security from a non-IT background or want to go through some of the basics one more time before moving to more challenging courses."
"For example, a video on encryption is less than two minutes long, but it mentions most of the essential things: symmetric vs. asymmetric, (3)DES, RC4, AES, RSA, etc."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybersecurity Fundamentals with these activities:
Organize your course notes and materials
Organize your notes, assignments, and other course materials to prepare for studying and future reference.
Show steps
  • Create a filing system for your notes and materials.
  • Review your notes regularly and make any necessary additions or updates.
Read 'Cryptography and Network Security' by Behrouz A. Forouzan
Review a comprehensive text on cryptography and network security to reinforce your understanding of the concepts and techniques covered in the course.
Show steps
  • Read and summarize key chapters in the book.
  • Complete the exercises and practice questions.
Review network and system administration fundamentals
Review network and system administration fundamentals to strengthen your understanding of the foundational concepts in this field.
Show steps
  • Review basic networking concepts, such as IP addressing, routing, and switching.
  • Review basic system administration concepts, such as file permissions, user management, and software installation.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Participate in a study group
Engage with peers to discuss course concepts, share insights, and work on assignments together.
Show steps
  • Find a study group or create one with classmates.
  • Meet regularly to discuss course materials, work on assignments, and prepare for exams.
Follow tutorials on network security
Follow tutorials to learn about network security concepts, protocols, and tools.
Browse courses on network security
Show steps
  • Watch videos or read articles on network security topics.
  • Try out network security tools, such as packet sniffers and intrusion detection systems.
Practice cryptography problems
Solve cryptography problems to improve your understanding of cryptography concepts and techniques.
Browse courses on Cryptography
Show steps
  • Solve problems involving basic cryptography algorithms, such as Caesar cipher, Vigenere cipher, and AES.
  • Practice breaking simple ciphers.
Develop a security plan for a small business
Develop a security plan to apply your knowledge of computing security concepts and tools to a real-world scenario.
Browse courses on Security Planning
Show steps
  • Conduct a risk assessment to identify potential threats and vulnerabilities.
  • Develop security policies and procedures to mitigate risks.
  • Create a security plan that outlines how to implement and maintain the security measures.
Participate in a cybersecurity competition
Challenge yourself and test your skills by participating in a cybersecurity competition.
Show steps
  • Find a cybersecurity competition that aligns with your interests and skill level.
  • Form a team or participate individually.
  • Prepare for the competition by practicing and studying.
  • Participate in the competition and try to solve the challenges.

Career center

Learners who complete Cybersecurity Fundamentals will develop knowledge and skills that may be useful to these careers:
Security Architect
Security Architects are responsible for designing and implementing security measures to protect an organization's computer systems and networks. They work to ensure that the organization's security measures are aligned with the organization's business objectives, and that they are scalable and cost-effective. They also help to develop and implement security policies and procedures, and to ensure that the organization's security measures are compliant with relevant laws and regulations. This course can help you build a foundation in security architecture concepts and tools, and it can prepare you for a career as a Security Architect. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security measures to protect an organization's computer systems and networks. They work to prevent, detect, and respond to security threats, such as malware, hacking, and data breaches. They also help to ensure that the organization's information systems are in compliance with relevant laws and regulations. This course can help you build a foundation in security engineering concepts and tools, and it can prepare you for a career as a Security Engineer. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Information Security Analyst
An Information Security Analyst is responsible for designing and implementing security measures to protect an organization's computer systems and networks. They work to prevent, detect, and respond to security threats, such as malware, hacking, and data breaches. They also help to ensure that the organization's information systems are in compliance with relevant laws and regulations. This course can help you build a foundation in information security concepts and tools, and it can prepare you for a career as an Information Security Analyst. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Chief Information Security Officer (CISO)
The Chief Information Security Officer (CISO) is responsible for overseeing the organization's information security program. They work to develop and implement security policies and procedures, and to ensure that the organization's information systems are secure and compliant with relevant laws and regulations. They also help to manage the organization's security risks, and to respond to security incidents. This course can help you build a foundation in information security concepts and tools, and it can prepare you for a career as a CISO. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Ethical Hacker
Ethical Hackers are responsible for testing the security of computer systems and networks by simulating attacks. They work to identify vulnerabilities in the system that could be exploited by attackers. They also help to develop and implement security measures to protect the system from these vulnerabilities. This course can help you build a foundation in ethical hacking concepts and tools, and it can prepare you for a career as an Ethical Hacker. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Security Consultant
Security Consultants are responsible for providing advice and guidance to organizations on how to improve their security posture. They work to assess the organization's security risks, and to develop and implement security measures to mitigate those risks. They also help to train the organization's employees on security best practices. This course can help you build a foundation in security consulting concepts and tools, and it can prepare you for a career as a Security Consultant. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Incident Responder
Incident Responders are responsible for responding to and resolving security incidents, such as malware attacks, hacking, and data breaches. They work to contain the damage caused by the incident, and to prevent it from happening again. They also help to investigate the incident and identify the attackers. This course can help you build a foundation in incident response concepts and tools, and it can prepare you for a career as an Incident Responder. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Penetration Tester
Penetration Testers are responsible for testing the security of computer systems and networks by simulating attacks. They work to identify vulnerabilities in the system that could be exploited by attackers. They also help to develop and implement security measures to protect the system from these vulnerabilities. This course can help you build a foundation in penetration testing concepts and tools, and it can prepare you for a career as a Penetration Tester. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
IT Auditor
IT Auditors are responsible for evaluating and reporting on the effectiveness of an organization's IT controls. They work to ensure that the organization's IT systems are secure and compliant with relevant laws and regulations. They also help to identify and mitigate IT risks, such as security breaches and data loss. This course can help you build a foundation in IT auditing concepts and tools, and it can prepare you for a career as an IT Auditor. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Risk Analyst
Risk Analysts are responsible for assessing and managing risks to an organization's computer systems and networks. They work to identify, prioritize, and mitigate risks that could impact the organization's operations or reputation. They also help to develop and implement risk management plans. This course can help you build a foundation in risk analysis concepts and tools, and it can prepare you for a career as a Risk Analyst. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Malware Analyst
Malware Analysts are responsible for analyzing malware to identify how it works and how to protect against it. They work to develop and implement anti-malware software, and to provide advice and guidance to organizations on how to protect themselves from malware attacks. This course can help you build a foundation in malware analysis concepts and tools, and it can prepare you for a career as a Malware Analyst. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Computer Forensics Analyst
Computer Forensics Analysts are responsible for investigating and analyzing computer systems and networks to identify evidence of crimes. They work to recover and preserve digital evidence, such as emails, files, and logs. They also help to testify in court about their findings. This course can help you build a foundation in computer forensics concepts and tools, and it can prepare you for a career as a Computer Forensics Analyst. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Security Administrator
Security Administrators are responsible for managing and maintaining an organization's security systems and networks. They work to ensure that the organization's security systems are up-to-date and functioning properly. They also help to troubleshoot and resolve security problems. This course can help you build a foundation in security administration concepts and tools, and it can prepare you for a career as a Security Administrator. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
System Administrator
System Administrators are responsible for managing and maintaining computer systems. They work to ensure that the systems are secure, reliable, and meet the needs of the organization's users. They also help to troubleshoot and resolve system problems. This course can help you build a foundation in system administration concepts and tools, and it can prepare you for a career as a System Administrator. The course covers topics such as cryptography, networking, systems administration, and malware analysis.
Network Administrator
Network Administrators are responsible for managing and maintaining an organization's computer networks. They work to ensure that the network is secure and reliable, and that it meets the needs of the organization's users. They also help to troubleshoot and resolve network problems. This course can help you build a foundation in network administration concepts and tools, and it can prepare you for a career as a Network Administrator. The course covers topics such as cryptography, networking, systems administration, and malware analysis.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybersecurity Fundamentals.
Provides a useful overview of memory forensics, useful as supplemental reading.
Provides a good overview of network security assessment techniques.
Provides a good introduction to using Metasploit for penetration testing.
Provides documentation on how to use Kali Linux, a useful tool in cybersecurity.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cybersecurity Fundamentals.
Ethical Hacking Essentials (EHE)
Most relevant
Digital Shield: Cybersecurity for Data and System...
Most relevant
Industrial Cybersecurity
Most relevant
Introduction to Automotive Cybersecurity & Vehicle...
Most relevant
Advanced Cybersecurity
Most relevant
Cybersecurity Fundamentals - Become a Security Expert
Most relevant
Network Security
Most relevant
Palo Alto Networks Cybersecurity Foundation
Most relevant
Threat Intelligence in Cybersecurity
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser