Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Description

In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

Tags

Syllabus

Unit 0: Getting Started
Unit 1: Computing Security Concepts and Problems 1
Unit 2: Computing Security Concepts and Problems 2
Unit 3: Cryptography
Unit 4: Networking 1
Unit 5: Networking 2
Unit 6: Systems Administration
Unit 7: Detection and Prevention
Unit 8: Malware and Forensics
Unit 9: Conclusion​​

Online Course

EdX

  • Type
    Online Course
  • Provider

In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

Unit 0: Getting Started
Unit 1: Computing Security Concepts and Problems 1
Unit 2: Computing Security Concepts and Problems 2
Unit 3: Cryptography
Unit 4: Networking 1
Unit 5: Networking 2
Unit 6: Systems Administration
Unit 7: Detection and Prevention
Unit 8: Malware and Forensics
Unit 9: Conclusion​​