We may earn an affiliate commission when you visit our partners.
Course image
Professor Peter Komisarczuk

The purpose of this short four-week course is to introduce the topic of computer system security. We initially look at a short basic introduction to computer system core components and functions and then extend this to consider a variety of topics from hardware to applications. Throughout we provide pointers to openly available materials for background and further reading to explore the topics. We refer to the Cyber Security Body of Knowledge (CyBOK) as a reference for cyber security knowledge, alongside other sources that are widely available.

Read more

The purpose of this short four-week course is to introduce the topic of computer system security. We initially look at a short basic introduction to computer system core components and functions and then extend this to consider a variety of topics from hardware to applications. Throughout we provide pointers to openly available materials for background and further reading to explore the topics. We refer to the Cyber Security Body of Knowledge (CyBOK) as a reference for cyber security knowledge, alongside other sources that are widely available.

In total, we have four weeks that cover this introduction to computer systems and security. No prior programming nor advanced mathematical knowledge Is required. There are a few examples of pseudocode and some basic computer logic (AND, OR, XOR, etc.) in our Week 1 Introduction to computer systems, but these are not essential to completing the course. In other lessons, we introduce basic concepts and provide pointers to online resources.

The course includes active learning through four lab sessions. The first lab introduces the Linux operating system in general by exploring the Linux desktop and applications provided in the Coursera lab environment hosted in the AWS cloud. The second lab looks at the Linux command line and explores some of the file system and gathers system information, for example to explore processes. The third lab explores the network information, the system connectivity, and uses some Python scripts and Wireshark to examine the TCP and UDP transport protocols and the web/HTTP application protocol. Lastly we explore more about the network services using the Nmap tool to explore the network services in the system.

The course is designed to provide a wide introduction to computer security, by outlining computer systems, including the operating system, programs, data and networking. We discuss some of the issues in computer security and introduce some of the vulnerabilities and threats as we progress through the four weeks. We include some optional readings and videos from a number of sources, including professional resources and vendor materials for additional study.

Enroll now

What's inside

Syllabus

Introduction to Computer Systems and Security
In Week 1, we introduce computer systems and the need for security and services provided.
Computer Architecture and Operating Systems
Read more
Week 2 continues our introduction to computer systems and security and allows us to explore computer systems and security further.
Operating systems control, authentication, authorisation and accounting
Week 3 provides an introduction to computer authentication, authorisation and accounting, which are key computer systems security functions.
Computer systems and networking
In week 4 we introduce networking, network protocols, some of the network features in the operating system and review computer system security.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces the topic of computer system security with a basic introduction to computer system core components and functions
Explores hardware to applications, providing pointers to openly available materials for background and further reading
Provides a good introduction to computer systems and security for beginners with no prior programming nor advanced mathematical knowledge required
Includes active learning through four lab sessions that cover the Linux operating system, Linux command line, network information, system connectivity, network services, and more
Outlines computer systems, including the operating system, programs, data, and networking, with a discussion of computer security issues, vulnerabilities, and threats
Provides real-world examples and case studies throughout in the four weeks of material

Save this course

Save Introduction to Computer Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Introduction to Computer Security with these activities:
Review basic computer science concepts
Review foundational computer science concepts to strengthen your understanding of the course material.
Show steps
  • Revisit programming language syntax and data structures.
  • Practice solving coding problems on platforms like LeetCode or HackerRank.
Participate in discussion forums
Engage with fellow students and the instructor in discussion forums to clarify concepts, share insights, and learn from others.
Show steps
  • Actively participate in the course discussion forums.
  • Ask questions and provide answers to help your peers.
Complete coding exercises
Regularly practice coding exercises to improve your problem-solving skills and reinforce concepts covered in the course.
Show steps
  • Solve coding challenges in the Coursera lab environment.
  • Participate in online coding competitions.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Explore additional resources
Enhance your understanding by seeking out external resources that provide further insights into the topics covered in the course.
Show steps
  • Watch YouTube videos on computer security best practices.
  • Read blog posts and articles from industry experts.
Install and configure a security tool
Gain hands-on experience by installing and configuring a security tool to protect your own computer or a virtual environment.
Show steps
  • Research and select a reputable security tool.
  • Install and configure the tool according to best practices.
  • Test the tool's functionality and effectiveness.
Write a summary of a security topic
Solidify your understanding by summarizing a specific security topic and sharing it with others.
Show steps
  • Choose a security topic of interest.
  • Research and gather information from credible sources.
  • Write a clear and concise summary.
  • Share your summary on a platform like Medium or LinkedIn.
Develop a security plan
Apply your knowledge by creating a comprehensive security plan for a specific organization or system.
Show steps
  • Identify and assess potential security risks.
  • Design and implement appropriate security measures.
  • Document the security plan and present it to stakeholders.

Career center

Learners who complete Introduction to Computer Security will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
A Cybersecurity Analyst protects computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course provides an overview of computer systems and security, including cybersecurity threats and vulnerabilities. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Cybersecurity Analyst.
Security Analyst
A Security Analyst investigates and responds to security incidents. This course provides an overview of computer systems and security, including vulnerabilities and threats. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Security Analyst.
Penetration Tester
A Penetration Tester evaluates the security of computer systems and networks by simulating attacks. This course provides an overview of computer systems and security, including penetration testing tools and techniques. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Penetration Tester.
Information Security Analyst
An Information Security Analyst develops and implements security measures to protect information from unauthorized access, use, disclosure, disruption, modification, or destruction. This course provides an overview of computer systems and security, including security vulnerabilities and threats. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for an Information Security Analyst.
Network Security Engineer
A Network Security Engineer designs, implements, and manages network security measures. This course provides an overview of computer systems and security, including network security protocols and threats. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Network Security Engineer.
IT Security Specialist
An IT Security Specialist plans, implements, and manages security measures to protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course provides an overview of computer systems and security, including vulnerabilities and threats. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for an IT Security Specialist.
Security Consultant
A Security Consultant advises clients on how to protect their computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course provides an overview of computer systems and security, including security vulnerabilities and threats. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Security Consultant.
Security Manager
A Security Manager is responsible for developing and implementing security policies and procedures for an organization. This course provides an overview of computer systems and security, including security vulnerabilities and threats. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Security Manager.
Computer Hardware Engineer
A Computer Hardware Engineer designs, develops, and tests computer hardware components and systems. This course provides an overview of computer systems and security, including hardware and operating systems. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Computer Hardware Engineer.
Systems Administrator
A Systems Administrator is responsible for maintaining and supporting computer systems and networks. This course provides an overview of computer systems and security, including system administration tools and techniques. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Systems Administrator.
Information Technology Auditor
An Information Technology Auditor evaluates the security of computer systems and networks. This course provides an overview of computer systems and security, including security vulnerabilities and threats. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for an Information Technology Auditor.
Software Engineer
A Software Engineer designs, develops, and tests software applications. This course provides an overview of computer systems and security, including software security vulnerabilities and threats. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Software Engineer.
Computer Systems Analyst
A Computer Systems Analyst plans, designs, and implements computer systems, including hardware, software, and networks. This course provides an overview of computer systems and security, including operating systems, authentication, authorization, and accounting. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Computer Systems Analyst.
Network Administrator
A Network Administrator plans, implements, and manages computer networks. This course provides an overview of computer systems andセキュリティ, including networking and network protocols. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Network Administrator.
Web Developer
A Web Developer designs, develops, and maintains websites. This course provides an overview of computer systems and security, including web application security vulnerabilities and threats. The labs in this course provide hands-on experience with Linux, networking, and security tools, which can be valuable for a Web Developer.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Introduction to Computer Security.
Covers the foundational concepts in computer system security. Because of its broad coverage, it valuable supplemental resource to this course.
Provides an introduction to cryptography and network security, which could supplement the computer security topics in this course.
Provides beginner-friendly coverage of Linux system administration, which complements the Linux topics in this course.
Provides an introduction to operating systems concepts, complementing the operating systems coverage in this course.
Introduces network security using concepts and standards, and can help with the networking topics in this course.
Discusses security engineering and building dependable distributed systems. It can supplement the computer security portion of this course.
Provides a historical perspective on hackers and the computer revolution. It can be interesting supplemental reading for those interested in the history of computer security.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser