TZ
Covers all fundamentals very well in the time given; however, should expand on cloud & software defined networks in future
The purpose of this short four-week course is to introduce the topic of computer system security. We initially look at a short basic introduction to computer system core components and functions and then extend this to consider a variety of topics from hardware to applications. Throughout we provide pointers to openly available materials for background and further reading to explore the topics. We refer to the Cyber Security Body of Knowledge (CyBOK) as a reference for cyber security knowledge, alongside other sources that are widely available.
In total, we have four weeks that cover this introduction to computer systems and security. No prior programming nor advanced mathematical knowledge Is required. There are a few examples of pseudocode and some basic computer logic (AND, OR, XOR, etc.) in our Week 1 Introduction to computer systems, but these are not essential to completing the course. In other lessons, we introduce basic concepts and provide pointers to online resources. The course includes active learning through four lab sessions. The first lab introduces the Linux operating system in general by exploring the Linux desktop and applications provided in the Coursera lab environment hosted in the AWS cloud. The second lab looks at the Linux command line and explores some of the file system and gathers system information, for example to explore processes. The third lab explores the network information, the system connectivity, and uses some Python scripts and Wireshark to examine the TCP and UDP transport protocols and the web/HTTP application protocol. Lastly we explore more about the network services using the Nmap tool to explore the network services in the system. The course is designed to provide a wide introduction to computer security, by outlining computer systems, including the operating system, programs, data and networking. We discuss some of the issues in computer security and introduce some of the vulnerabilities and threats as we progress through the four weeks. We include some optional readings and videos from a number of sources, including professional resources and vendor materials for additional study.
TZ
Covers all fundamentals very well in the time given; however, should expand on cloud & software defined networks in future
Showing: 12 of 12
I love it
An amazing introduction to computer security! Dr. Komisarczuk covered essential topics in depth, making complex concepts clear and engaging. The course offered a great mix of theory and hands-on exercises, which really helped solidify my understanding and practical skills. I highly recommend this course to anyone interested in cybersecurity, whether you're new to the field or looking to refresh your knowledge with an up-to-date foundation! Many thanks!
Everyone chases the programming-heavy security certs. This is the quiet, smarter path. By focusing on authorization models and system vulnerabilities without code prerequisites, it turns managers, auditors, and career-switchers into people who can actually talk to engineers. That's rarer and more valuable than you think.
Covers all fundamentals very well in the time given; however, should expand on cloud & software defined networks in future
Clear and direct-to-the-point course
I really enjoy it very complete
Exceptional. My gratitude.
Keep up the good work
good job
Awesome
Videos are too long. Instructor in the video does not speak clearly and so hearing and understanding is difficult.
thanks