Introduction to Computer Security

This course is part of Cyber Security – Technology and Governance Specialization

Instructor: Professor Peter Komisarczuk

Skills you'll gain

  •   Computer Systems
  •   Network Analysis
  •   Linux
  •   Authorization (Computing)
  •   Operating Systems
  •   Virtual Private Networks (VPN)
  •   Vulnerability Assessments
  •   Network Security
  •   Network Monitoring
  •   Hardware Architecture
  •   Network Protocols
  •   Computer Architecture
  •   Authentications
  •   Threat Detection
  •   Application Security
  •   Command-Line Interface
  •   Cybersecurity
  • There are 4 modules in this course

    In total, we have four weeks that cover this introduction to computer systems and security. No prior programming nor advanced mathematical knowledge Is required. There are a few examples of pseudocode and some basic computer logic (AND, OR, XOR, etc.) in our Week 1 Introduction to computer systems, but these are not essential to completing the course. In other lessons, we introduce basic concepts and provide pointers to online resources. The course includes active learning through four lab sessions. The first lab introduces the Linux operating system in general by exploring the Linux desktop and applications provided in the Coursera lab environment hosted in the AWS cloud. The second lab looks at the Linux command line and explores some of the file system and gathers system information, for example to explore processes. The third lab explores the network information, the system connectivity, and uses some Python scripts and Wireshark to examine the TCP and UDP transport protocols and the web/HTTP application protocol. Lastly we explore more about the network services using the Nmap tool to explore the network services in the system. The course is designed to provide a wide introduction to computer security, by outlining computer systems, including the operating system, programs, data and networking. We discuss some of the issues in computer security and introduce some of the vulnerabilities and threats as we progress through the four weeks. We include some optional readings and videos from a number of sources, including professional resources and vendor materials for additional study.

    Computer Architecture and Operating Systems

    Operating systems control, authentication, authorisation and accounting

    Computer systems and networking

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved