- Level Foundation
- Duration 41 hours
- Course by University of London
-
Offered by
About
The purpose of this short four-week course is to introduce the topic of computer system security. We initially look at a short basic introduction to computer system core components and functions and then extend this to consider a variety of topics from hardware to applications. Throughout we provide pointers to openly available materials for background and further reading to explore the topics. We refer to the Cyber Security Body of Knowledge (CyBOK) as a reference for cyber security knowledge, alongside other sources that are widely available. In total, we have four weeks that cover this introduction to computer systems and security. No prior programming nor advanced mathematical knowledge Is required. There are a few examples of pseudocode and some basic computer logic (AND, OR, XOR, etc.) in our Week 1 Introduction to computer systems, but these are not essential to completing the course. In other lessons, we introduce basic concepts and provide pointers to online resources. The course is designed to provide a wide introduction to computer security, by outlining computer systems, including the operating system, programs, data and networking. We discuss some of the issues in computer security and introduce some of the vulnerabilities and threats as we progress through the four weeks. We include some optional readings and videos from a number of sources, including professional resources and vendor materials for additional study.Modules
Lesson 1: Introducing computer systems and security
1
Assignment
- Introducing computer systems and security
1
Discussions
- Getting to know each other
1
Videos
- Introduction to computer security
6
Readings
- Course overview and study guide
- Starting your studies
- Study journal reflection – expectations
- Week 1 introduction
- An overview of computer systems and security
- Activity – Create a list of security terms and definitions
Lesson 2: Computers, data and programs
1
Assignment
- Computers and data
1
Videos
- Computers, data and programs
1
Readings
- Computers and data
Lesson 3: Operating Systems and Data
2
Assignment
- Data representation and storage
- Week 1 test
1
Labs
- Introduction to Linux
3
Videos
- An introduction to the operating system
- The stream cipher
- Week 1 summary
5
Readings
- The operating system and its functionality
- Lab: Introduction to Linux
- Data representation and manipulation
- Reflection on Week 1
- Week 1: Additional resources for further study
Lesson 1: Data representation and manipulation
1
Assignment
- Layered models
3
Videos
- Week 2 introduction
- Introduction to layered models of computer systems
- Extending our layered model of computer systems
2
Readings
- Introduction to Week 2
- A layered representation of a computer system
Lesson 2: Computer security design principles
1
Assignment
- Computer security design principles
2
Readings
- Computer security terminology
- Security design principles
Lesson 3: Personal computer system architecture
1
Assignment
- Personal computer architecture
2
Videos
- Personal computer systems architecture
- Computer input/output
1
Readings
- An introduction to personal computer systems architecture
Lesson 4: Operating systems, virtualisation and security
2
Assignment
- Operating systems, virtualisation and software
- Week 2 test
1
Discussions
- Operating systems
1
Labs
- Exploring the Linux system and command line
2
Videos
- Operating systems security
- Week 2 summary
8
Readings
- Modern operating systems
- Lab: Exploring the Linux system and command line
- Virtualisation
- Program/software classification
- Exploring the Windows 11 operating system
- Optional – Modern operating system: requirements for hardware security
- Week 2 reflection
- Week 2: Additional resources for further study
Lesson 1: Authentication
1
Assignment
- Authentication mechanisms
1
Discussions
- Authentication factors
2
Videos
- Week 3 introduction
- An introduction to authentication
4
Readings
- Introduction to Week 3
- Authentication and authorisation
- Authentication – passwords, tokens, biometrics and policy
- Authentication – further optional reading
Lesson 2: Authorisation and access control
2
Assignment
- Computer control overview
- Access control and accounting
3
Videos
- Authorisation
- Computer systems control
- Accounting
6
Readings
- Authorisation and access control
- Computer system control
- Control mechanisms
- Authorisation, access control and accounting
- Access control models
- Accounting – Monitoring usage and events
Lesson 3: Application controls
2
Assignment
- Applications and control
- Week 3 test
1
Videos
- Week 3 summary
4
Readings
- Case study: Web browser application control
- Further reading – Modern operating system: application security
- Week 3 reflection
- Week 3: Additional resources for further study
Lesson 1: Introduction to computer networking
3
Assignment
- Computer networking
- Computer network threats and vulnerabilities
- Computer network security
6
Videos
- Week 4 introduction
- Computer networks and security
- Networks and network equipment
- Network security - Threats and vulnerabilities
- Network security devices
- The DMZ and network zones
2
Readings
- Introduction to Week 4
- Network technologies and computer systems
Lesson 2: Network protocols and end systems
1
Assignment
- Network protocols
1
Labs
- Exploring network protocols on Linux
2
Readings
- Network protocols
- Lab: exploring network protocols in Linux
Lesson 3: Network authentication
1
Assignment
- Network authentication
1
Videos
- Network authentication protocols
2
Readings
- An introduction to network authentication
- Network authentication protocol patterns
Lesson 4: Computer security and protection
2
Assignment
- Threats and vulnerabilities
- Week 4 test
1
Labs
- Mapping networks using Nmap
2
Videos
- Computer systems security – threats and vulnerabilities
- Course review and where next
8
Readings
- Computer system vulnerabilities
- Computer system security
- Application case study: the web browser
- Optional reading: The computer, the browser and digital fingerprints
- Introduction to attack surface, CVE, CWE and CVSS
- Lab: Mapping networks using Nmap
- Week 4 reflection
- Week 4: Additional resources for further study
Auto Summary
Discover the essentials of computer security with this engaging four-week course. Perfect for beginners, it covers core components, functions, and security topics from hardware to applications. No prior programming or advanced math needed. Guided by the Cyber Security Body of Knowledge, you'll explore vulnerabilities and threats with additional resources for deeper learning. Offered by Coursera, this foundational course is ideal for those seeking a broad understanding of IT security.

Professor Peter Komisarczuk