University of Colorado Boulder

Basic Ideas in Computing Security

Seize the savings! Get 40% off 3 months of Coursera Plus and full access to thousands of courses.

University of Colorado Boulder

Basic Ideas in Computing Security

Ahmed M. Hamza

Instructor: Ahmed M. Hamza

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

7 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

7 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • You will learn how to use prominent sources of cyber threat intelligence in the open source domain to identify current threats and prioritize action.

  • You will learn what the basic working terminology is in computing security, and how to analyze vulnerability disclosures and their impact.

  • You will study authorization mechanisms as applied to Unix, and use them to set and change permission access levels on a modern operating system.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

March 2026

Assessments

6 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 4 modules in this course

An introduction to the world of cybersecurity terminology, objectives, and the contrast between vulnerabilities/bugs and weakness enumeration in the security community. Learn how vulnerabilities are scored using objective, quantitative measures of impact.

What's included

4 videos4 readings1 assignment

Discover what organizations keep track of known, actively exploited vulnerabilities and malware campaigns, and how to use that information to make decisions affecting critical systems. We discuss how prioritization is not always a simple quantitative procedure. Also find out how to use public tools to quickly check any un-trusted files, URLs, and file signatures against hundreds of anti-malware engines and community notes.

What's included

2 videos1 reading2 assignments

What are the main factors of authentication based on? What is multi-factor authentication, and how does it relate to authentication protocols? How can authentication factors be vulnerable even when based on advanced tech?

What's included

3 videos2 readings2 assignments

Maintaining access control is a critical feature of security and a driving force of all cryptographic systems. Here we explore two basic forms of authorization models (Mandatory and Discretionary), and dive into the world of Unix filesystem access control as an example of the latter.

What's included

3 videos1 assignment1 ungraded lab

Instructor

Ahmed M. Hamza
University of Colorado Boulder
4 Courses 3,071 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions