We may earn an affiliate commission when you visit our partners.
Course image
Lorena González Manzano, José María de Fuentes, Pedro Peris-Lopez, and Juan E. Tapiador

Are you tired of hearing that your computer has a virus? Or that your email account has been hacked? Now, is the time for you to protect yourself by understanding the basics of cyber security.

This computer science course presents an introduction to cyber security showing different aspects of this discipline. You will learn what the main existing cyber security threats are and how to protect yourself against them. The course presents a practical approach in which all required material will be provided to allow you to better understand attacks and establish appropriate countermeasures.

Read more

Are you tired of hearing that your computer has a virus? Or that your email account has been hacked? Now, is the time for you to protect yourself by understanding the basics of cyber security.

This computer science course presents an introduction to cyber security showing different aspects of this discipline. You will learn what the main existing cyber security threats are and how to protect yourself against them. The course presents a practical approach in which all required material will be provided to allow you to better understand attacks and establish appropriate countermeasures.

Taught by instructors with years of experience in the field of computer security, this course will pave the way to the security area of IT-related professions.

What you'll learn

  • Cyber security landscape
  • Reverse engineering
  • Managing and monitoring network cyber security attacks
  • Computer forensics
  • Malware and advanced persistent threats
  • Vulnerability management and pentesting

What's inside

Learning objectives

  • Cyber security landscape
  • Reverse engineering
  • Managing and monitoring network cyber security attacks
  • Computer forensics
  • Malware and advanced persistent threats
  • Vulnerability management and pentesting

Syllabus

Lecture 1. Cybersecurity: an overview This lecture introduces the impact of cybersecurity nowadays, as well as some examples of cyberthreats that motivate the relevance of this area of study. Types of cyberthreats, such as cybercrime or cyberwarfare, are later described, together with an overview of the current cyberthreat landscape. Finally, some well-known cybersecurity events are presented.
Read more
Lecture 2. Computer forensics This lecture introduces computer forensics, that is the technique focused on the analysis and preservation of evidences in a particular computer device after an attack occurs. Common forensic traces are defined, namely traces left by deleted files, hidden data and fake emails.
Lecture 3. Assembly programming: towards reversing This lecture introduces the main concepts of reverse engineering, that is, the ability to take an executable element and try to figure out how it works. The definition of this technique is introduced. After some theoretical knowledge, examples of disassembling C codes and decompiling codes in different languages, namely Java and C, are presented.
Lecture 4. Cyberdefense This lecture introduces the main concepts of cyberdefense together with common applied tools. After presenting this topic, firewalls are outlined. The following part involves the description of Intrusion Detection Systems (IDSs). Security Information and Event management (SIEM) systems, which refer to a general approach to manage cyberdefense, are finally presented.
Lecture 5. Malware and Advanced Persistent Threats (APTs) This lecture explains the main concepts related to malware and Advanced Persistent Threats (APTs), together with the main techniques to achieve their identification. The definition and types of malware, APTs and some real cases are introduced.
Lecture 6. Vulnerabilities and exposures This last lesson presents vulnerabilities description and management. It describes and gives examples of the most common vulnerabilities at software, network and web level. The definition, use and application of penetration testing (pentesting) are also presented, as well as some examples applying the well-known tool Metasploit. Repositories of vulnerabilities are finally introduced.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores cybersecurity, which is standard in industry
Taught by authors recognized for their work in cybersecurity
Develops understanding of cyber threats and how to protect against them
Provides a practical approach with hands-on materials
Covers reverse engineering, computer forensics, and malware analysis
Provides a foundation for IT professionals seeking to specialize in security

Save this course

Save Cyber Security Basics: A Hands-on Approach to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cyber Security Basics: A Hands-on Approach with these activities:
Review key concepts in computer forensics
Refresh and reinforce concepts learned in previous computer forensics courses to prepare for this course.
Browse courses on Computer Forensics
Show steps
  • Review notes and materials from previous computer forensics courses.
  • Read articles or watch videos on current trends and techniques in computer forensics.
  • Participate in online forums or discussion groups related to computer forensics.
Review Python programming concepts
Go over basic python programming concepts such as variables, data types, operators, and loops.
Browse courses on Python
Show steps
  • Revise Python syntax and data structures using an online tutorial.
  • Solve simple Python coding problems on a coding challenge website.
Practice reversing simple assembly code
Strengthen your understanding of assembly programming by practicing reversing simple assembly code.
Browse courses on Assembly Programming
Show steps
  • Install a disassembler tool such as IDA Pro or Ghidra.
  • Find simple assembly code examples online or in textbooks.
  • Disassemble the assembly code and try to understand its functionality.
  • Write a brief explanation of how the code works.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Analyze network traffic using Wireshark
Gain hands-on experience in network traffic analysis to better understand network cyber security threats.
Browse courses on network security
Show steps
  • Install Wireshark on your computer.
  • Capture network traffic using a physical or virtual network interface.
  • Use Wireshark to analyze the captured traffic, identifying different protocols, IP addresses, and ports.
  • Create a report summarizing your findings.
Develop a security policy for a small business
Apply your knowledge of cyber security by developing a comprehensive security policy for a small business.
Browse courses on Cybersecurity Policy
Show steps
  • Identify the assets and threats relevant to the small business.
  • Research industry best practices and regulations for cybersecurity.
  • Draft a security policy that outlines the business's security objectives, controls, and procedures.
  • Review and finalize the security policy with input from stakeholders.
Participate in a cybersecurity hackathon
Test your cybersecurity skills and knowledge by participating in a hackathon.
Browse courses on Cybersecurity
Show steps
  • Find a cybersecurity hackathon that aligns with your interests and skill level.
  • Form a team or work individually.
  • Develop a solution to the hackathon challenge.
  • Present your solution to a panel of judges.
Create a cybersecurity resource guide
Consolidate and organize cybersecurity resources to improve your knowledge and understanding.
Browse courses on Information Security
Show steps
  • Identify and gather relevant cybersecurity resources such as articles, whitepapers, and tools.
  • Categorize and organize the resources based on topic or type.
  • Create a central repository for easy access to the resources.
  • Share your resource guide with others in the field.
Mentor a junior cybersecurity professional
Enhance your understanding of cybersecurity concepts by sharing your knowledge and experience with others.
Browse courses on Career Development
Show steps
  • Identify a junior cybersecurity professional who could benefit from your guidance.
  • Set up regular meetings to share knowledge, provide feedback, and offer support.
  • Help the mentee develop their technical skills and professional network.
  • Evaluate the mentee's progress and adjust your approach as needed.

Career center

Learners who complete Cyber Security Basics: A Hands-on Approach will develop knowledge and skills that may be useful to these careers:
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is the highest-ranking security executive in an organization. As a CISO, you would be responsible for developing and implementing the organization's information security strategy. This course may be useful to you in this role because it provides an overview of the cyber security landscape, including the different types of cyber threats and how to protect against them.
Penetration Tester
A Penetration Tester is someone who simulates cyber attacks to identify vulnerabilities in computer systems and networks. As a Penetration Tester, you could work for a variety of organizations, including government agencies, financial institutions, and healthcare providers. This course may be useful to you in this role because it provides an overview of penetration testing, including how to use the well-known tool Metasploit.
Vulnerability Analyst
A Vulnerability Analyst is someone who identifies and assesses vulnerabilities in computer systems and networks. As a Vulnerability Analyst, you could work for a variety of organizations, including government agencies, financial institutions, and healthcare providers. This course may be useful to you in this role because it provides an overview of vulnerabilities and exposures, including how to identify and manage them.
Security Engineer
A Security Engineer is someone who designs, implements, and maintains security measures to protect computer systems and networks. As a Security Engineer, you could work for a variety of organizations, including government agencies, financial institutions, and healthcare providers. This course may be useful to you in this role because it provides an overview of the cyber security landscape, including the different types of cyber threats and how to protect against them.
Malware Analyst
A Malware Analyst is someone who studies malware, or malicious software, to understand how it works and how to protect against it. As a Malware Analyst, you could work for a variety of organizations, including security companies, government agencies, and financial institutions. This course may be useful to you in this role because it provides an overview of malware and advanced persistent threats, including how to identify and mitigate them.
Information Security Manager
An Information Security Manager is someone who oversees the information security program for an organization. As an Information Security Manager, you could work for a variety of organizations, including government agencies, financial institutions, and healthcare providers. This course may be useful to you in this role because it provides an overview of the cyber security landscape, including the different types of cyber threats and how to protect against them.
Cybersecurity Consultant
A Cybersecurity Consultant is someone who provides cybersecurity advice and services to organizations. As a Cybersecurity Consultant, you could work for a variety of organizations, including government agencies, financial institutions, and healthcare providers. This course may be useful to you in this role because it provides an overview of the cyber security landscape, including the different types of cyber threats and how to protect against them.
Computer Forensic Analyst
A Computer Forensic Analyst is someone who examines computer systems and networks to find evidence of criminal activity. As a Computer Forensic Analyst, you could work with law enforcement or private companies to investigate cybercrimes. This course may be useful to you in this role because it provides an introduction to computer forensics, including how to analyze and preserve evidence in a particular computer device after an attack occurs.
Cybersecurity Incident Responder
A Cybersecurity Incident Responder is someone who responds to and investigates cybersecurity incidents. As a Cybersecurity Incident Responder, you could work for a variety of organizations, including government agencies, financial institutions, and healthcare providers. This course may be useful to you in this role because it provides an overview of the cyber security landscape, including the different types of cyber threats and how to protect against them.
Cybersecurity Instructor
A Cybersecurity Instructor is someone who teaches cybersecurity courses to students. As a Cybersecurity Instructor, you could work for a variety of organizations, including universities, colleges, and training providers. This course may be useful to you in this role because it provides an overview of the basics of cybersecurity, including the different types of cyber threats and how to protect against them.
Systems Administrator
A Systems Administrator is someone who manages and maintains computer systems and networks. As a Systems Administrator, you could work for a variety of organizations, including government agencies, financial institutions, and healthcare providers. This course may be useful to you in this role because it provides an overview of the cyber security landscape, including the different types of cyber threats and how to protect against them.
Security Analyst
A Security Analyst is someone who monitors and analyzes security data to identify and respond to security threats. As a Security Analyst, you could work for a variety of organizations, including government agencies, financial institutions, and healthcare providers. This course may be useful to you in this role because it provides an overview of the cyber security landscape, including the different types of cyber threats and how to protect against them.
Network Security Engineer
A Network Security Engineer is someone who designs, implements, and maintains network security measures. As a Network Security Engineer, you could work for a variety of organizations, including government agencies, financial institutions, and healthcare providers. This course may be useful to you in this role because it provides an overview of the cyber security landscape, including the different types of cyber threats and how to protect against them.
Cloud Security Engineer
A Cloud Security Engineer is someone who secures cloud computing environments. As a Cloud Security Engineer, you could work for a variety of organizations, including cloud providers, government agencies, and financial institutions. This course may be useful to you in this role because it provides an overview of the cyber security landscape, including the different types of cyber threats and how to protect against them.
Cyber Security Analyst
A Cyber Security Analyst is someone who knows how to protect computer networks and systems. As a Cyber Security Analyst, you could set up firewalls, detect and respond to security breaches, and develop security policies and procedures. This course may be useful to you in this role because it teaches the basics of cyber security, including how to manage and monitor network cyber security attacks, identify malware and advanced persistent threats, and manage vulnerabilities.

Reading list

We've selected 40 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cyber Security Basics: A Hands-on Approach.
Provides a comprehensive overview of cybersecurity, covering a wide range of topics from network security to information security management. It valuable reference for anyone who wants to learn more about cybersecurity.
Presents a comprehensive overview of computer security, including principles, technologies, and management aspects. Provides additional depth and breadth to the course content.
Provides a comprehensive overview of computer security. It covers topics such as security threats, security controls, and security management. This book commonly used textbook for undergraduate and graduate courses in computer security. It is also a valuable resource for security professionals.
Provides a detailed guide to advanced penetration testing techniques, covering topics such as vulnerability assessment, exploitation, and post-exploitation. It valuable resource for experienced security professionals who want to take their skills to the next level.
Provides a comprehensive overview of cybersecurity topics. It good reference for those who want to learn more about the different aspects of cybersecurity.
Provides a comprehensive overview of applied cryptography. It covers topics such as encryption, authentication, and digital signatures. This book commonly used textbook for undergraduate and graduate courses in cryptography. It is also a valuable resource for security professionals.
Provides a comprehensive overview of cybersecurity operations. It covers topics such as security monitoring, incident response, and threat intelligence. This book valuable resource for anyone who wants to learn more about cybersecurity operations.
Provides a comprehensive guide to malware analysis, with a focus on practical techniques and tools. It valuable resource for anyone who wants to learn how to identify, analyze, and mitigate malware threats.
Provides a comprehensive guide to vulnerability management, including identification, assessment, and remediation. Enhances the course's lecture on vulnerabilities and exposures.
Presents a comprehensive guide to security engineering principles and practices. Provides a theoretical foundation for the course's practical approach.
Provides a hands-on guide to security testing techniques, covering topics such as threat modeling, vulnerability assessment, and penetration testing. It valuable resource for students and professionals who want to develop their skills in security testing.
Provides a comprehensive overview of Wireshark, a popular network analysis tool. It good resource for those who want to learn how to use Wireshark to analyze network traffic.
An introduction to malware analysis and reverse engineering techniques.
Provides a comprehensive overview of cryptography principles and practices, covering topics such as encryption, decryption, and hashing. It valuable resource for students and professionals seeking a foundational understanding of cryptography.
Presents a practical approach to network security, covering topics such as vulnerability assessment, exploitation, and defense. Complements the course's overall focus on cybersecurity practices.
Provides a comprehensive overview of cloud security principles and practices, covering topics such as access control, cryptography, and network security. It valuable resource for students and professionals seeking a foundational understanding of cloud security.
Provides an overview of computer security concepts and practices. It good resource for those who are new to the field or who want to refresh their knowledge.
Provides an overview of APTs and discusses strategies for defending against them.
Provides a practical guide to ethical hacking. It good resource for those who want to learn how to ethically hack into systems in order to find and fix security vulnerabilities.
A comprehensive textbook on computer networks, providing a strong foundation for understanding network security concepts.
Provides an overview of social engineering techniques and how to protect against them. It good resource for those who want to learn more about the human element of security.
Provides an introduction to computer forensics. It good resource for those who want to learn more about the process of investigating computer crimes.
Covers network security principles and technologies, including firewalls, intrusion detection systems, and virtual private networks. Enhances the course's lecture on cyberdefense.
Provides a practical introduction to computer forensics. It covers topics such as evidence collection, analysis, and reporting. This book useful resource for anyone who wants to learn more about computer forensics.
A reference guide to firewalls and intrusion detection systems, providing a detailed overview of their functionality and implementation.
An accessible introduction to operating systems, providing a solid foundation for understanding cybersecurity concepts.
Introduces the basics of reverse engineering, including disassembly and decompilation techniques. Complements the course's lecture on reverse engineering.
Offers practical guidance on penetration testing, including techniques and tools. Complements the course's lecture on vulnerability management and pentesting.
Covers cloud computing security concepts and practices, including cloud security models, threats, and countermeasures. Extends the course's scope to modern infrastructure.
Provides a comprehensive guide to hacking, with a focus on practical techniques and tools. It valuable resource for anyone who wants to learn how to exploit vulnerabilities and protect their systems from attack.
Provides a gentle introduction to cybersecurity concepts and practices, making it suitable for beginners with little or no prior knowledge of the field. It covers topics such as security threats, risk management, and security tools.
Provides a gentle introduction to network security concepts and practices, making it suitable for beginners with little or no prior knowledge of the field. It covers topics such as security threats, risk management, and security tools.
Provides practical guidance on ethical hacking techniques and tools. Complements the course's emphasis on vulnerability management and penetration testing.
Provides a practical guide to cybersecurity in Spanish, covering topics such as cryptography, network security, and malware analysis. Complements the course's overall content.
Provides an in-depth look at firewalls, their types, configurations, and management. Adds depth to the course's lecture on cyberdefense.
Provides a comprehensive overview of cybersecurity, with a focus on the essential concepts and principles. It great resource for anyone who wants to learn the basics of cybersecurity.
Provides a comprehensive guide to network security assessment, with a focus on practical techniques and tools. It valuable resource for anyone who wants to learn how to assess the security of networks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cyber Security Basics: A Hands-on Approach.
Cyber Security Essentials: Your Role in Protecting the...
Most relevant
Digital Shield: Cybersecurity for Data and System...
Most relevant
Digital Shield: Cybersecurity for Data and System...
Most relevant
Digital Shield: Cybersecurity for Data and System...
Most relevant
Securing SQL Server Applications
Most relevant
IoT Device Security: Executive Briefing
Most relevant
Cybersecurity Fundamentals
Most relevant
Cyber Security: Executive Briefing
Most relevant
The Cyber Security Landscape
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser