- Course type: Self-paced
- Available Lessons: 97
- Average Lesson Length: 8 min
- New lessons are still being added
Watch a preview:chapter 1 / lesson 1What is Computer Security? - Definition & Basics
Course SummaryThis convenient computer science course outlines the defensive security topics you need to know, whether you're refreshing your working knowledge or learning something new. This course is made up of self-paced lessons and assessment quizzes.
To Start This Course Today
Try it risk-free for 30 days
Course Practice TestCheck your knowledge of this course with a 50-question practice test.
- Comprehensive test covering all topics
- Detailed video explanations for wrong answers
About This Course
The professionally taught lessons in our Computer Science 203 course make defensive security topics easy for you to learn or review. Work at your own pace and on any mobile device or computer as you study risk assessment, vulnerability management, computer hardware security, access control methods and more. To ensure you've understood what you've learned, take the quiz we've provided with each lesson or the comprehensive test included with each chapter. If you have any questions as you work through this information, reach out to one of our experts for assistance via the dashboard.
This course is helpful for a variety of learning purposes, from students who need help studying and IT professionals looking to refresh their knowledge, to teachers updating their curriculum.
|Introduction to Defensive Security||Explains computer security, hacking and information security.|
|Malicious Software Overview||Outlines different kinds of malware, computer viruses and ransomware, plus how to prevent computer spyware.|
|Networking Threats||Defines Denial of Service (DoS) attacks, session hijacking and pharming and spoofing attacks.|
|Risk Assessment & Vulnerability Management||Identifies the purpose of computer security risk assessments, vulnerability management and how to respond to security risks after an assessment.|
|Network Auditing & Monitoring||Discusses the purpose of network monitoring, protocol analyzers, capturing network traffic and auditing system security settings.|
|Computer Hardware Security||Details full disk encryption, mobile malware, mobile security and how to secure computer storage devices.|
|Media & Mobile Network Security||Covers network security threats, wireless network security issues and solutions and how to secure a wireless network.|
|Access Control Methods & Models||Explains access control lists, access control matrices and user account control (UAC).|
|Physical Data Security & Authentication Models||Describes Kerberos encryption types, virtual private networks (VPNs) and authentication for mobile devices.|
|Operating System & Virtualization Security||Outlines polices for operating system security, virtual machines and how virtual machines provide operating system functions.|
|Computer Application & Programming Security||Defines web browsers, proxy and content filtering, securing desktop/web applications and software testing.|
|Network Security Design||Discusses security zones, cloud computing and address translation.|
|Network Area Security||Identifies firewalls in network security, SSH proxy tunnels and methods of data loss prevention (DLP).|
|Encryption & Hashing||Covers asymmetric and symmetric encryption, RC4 encryption algorithms and the advanced encryption standard (AES).|
|Methods of Secure Online Communication||Details email encryption, dual-sided vs. single-sided certificates and accessing a server via SSH.|
|Failure Tolerance & Disaster Recovery||Discusses RAID arrays and data redundancy, physical security and environmental controls and IT disaster planning and recovery.|
|Social Engineering & Organizational Policies||Explains information security policy, social engineering and digital crime attacks.|
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Research Schools, Degrees & Careers
Get the unbiased info you need to find the right school.
Browse Articles By Category
Browse an area of study or degree level.
- Biological and Biomedical Sciences
- Communications and Journalism
- Computer Sciences
- Culinary Arts and Personal Services
- Liberal Arts and Humanities
- Mechanic and Repair Technologies
- Medical and Health Professions
- Physical Sciences
- Transportation and Distribution
- Visual and Performing Arts
- Self-Paced Distance Learning: How Does IT Work?
- Online Courses for Computer Security: Course Descriptions
- What You Need To Know About The ParaPro Assessment
- Self-Paced Computer Training Programs and Requirements
- Distance Learning Course in Computer Network Administration
- Should I Major in Computer Science? - Quiz & Self-Assessment Test
- Top School in San Diego for Computer Security Courses
- Top School with Courses in Computer Security - Virginia Beach, VA
- Top School that Offers Courses in Computer Security - Alexandria, VA
- Online Computer Science Courses, Classes and Schools
- Answers and detailed explanations to each question
- Video lessons to explain complicated concepts
Explore our library of over 75,000 lessons
- College Courses
- High School Courses
- Other Courses