- Course type: Self-paced
- Available Lessons: 118
- Average Lesson Length: 8 min
Eligible for Credit: Yes
Earn transferable credit by taking this course for credit.
Watch a preview:chapter 1 / lesson 1What is Computer Security? - Definition & Basics
Course SummaryComputer Science 203: Defensive Security has been evaluated and recommended for 3 semester hours and may be transferred to over 2,000 colleges and universities. With this self-paced course, you get engaging lessons, expert instructors who make even the most challenging computer science topics simple, and an excellent resource for getting a head start on your degree.
to start this course today
Try it risk-free for 30 days
Course Practice TestCheck your knowledge of this course with a 50-question practice test.
- Comprehensive test covering all topics
- Detailed video explanations for wrong answers
|Course Progress||Best Score|
|Lesson 1 - Defensive Security - Assignment: Conducting a Risk Assessment|
The course objective is to define defensive security topics and access cybersecurity risks to systems and networks.
Your grade for this course will be calculated out of 300 points. The minimum score required to pass and become eligible for college credit for this course is 210 points, or an overall course grade of 70%. The table below shows how your overall grade will be calculated.
|Proctored Final Exam||100|
Quizzes are meant to test your comprehension of each lesson as you progress through the course. Here's a breakdown of how you will be graded on quizzes and how they'll factor into your final score:
- You will have 3 attempts to take each quiz for a score.
- The highest score of your first 3 attempts will be recorded as your score for each quiz.
- When you've completed the course, the highest scores from your first 3 attempts at each quiz will be averaged together and weighed against the total possible points for quizzes. For instance, if your average quiz score is 85%, you'll receive 85 out of 100 possible points for quizzes.
- After your initial 3 attempts, you can take a quiz for practice as many times as you'd like.
- You will need to pass each quiz with a score of at least 80% to earn course progress for the lesson. However, it is not necessary to earn 80% within the first three quiz attempts.
Assignments are intended to assess your application, analysis, and critical thinking skills in relation to the concepts you learn in the course. One assignment is required for this course. You can access them here.
- All assignment scores will total up to 100 points.
- Your assignment(s) will be graded by a Study.com instructor.
- The instructor will provide a graded rubric for you along with feedback on what you did well and what could be improved.
- If you are unsatisfied with your score, you will be able to revise and resubmit your assignment(s) twice. You are free to resubmit an assignment within two weeks of your most recent exam attempt or at any point if you have an active college accelerator membership.
Proctored Final Exam
The proctored final exam is a cumulative test designed to ensure that you've mastered the material in the course.
- You'll earn points equivalent to the percentage grade you receive on your proctored final. (So if you earn 90% on the final, that's 90 points toward your final grade.)
- If you're unsatisfied with your score on the exam, you'll be eligible to retake the exam after a 3-day waiting period.
- You can only retake the exam twice, so be sure to use your study guide and fully prepare yourself before you take the exam again.
Items Allowed on Study.com Proctored Exam for Computer Science 203: Defensive Security:
- Blank scratch paper
- Pen or pencil
Items NOT Allowed on Study.com Proctored Exam for Computer Science 203: Defensive Security:
- Office programs, web browsers, or any programs other than Software Secure (including Study.com lessons)
- Textbooks (digital or physical)
- Mobile phones, headphones, speakers, TVs, or radios
- Notebooks or notes
- Any calculators
Upon completion of the course, you will be able to:
- Identify threats to computer and network systems and assess their impact.
- Identify and evaluate the secureness of network devices, media, and topologies.
- Assess security risks and suggest appropriate risk mitigation strategies.
- Define the various concepts in network defense.
- Apply networking monitoring tools, technologies, defense measures, and protocols to a computer network.
- Evaluate the effectiveness of various encryption techniques and their impact on accessibility.
There are no prerequisites for this course.
Computer Science 203: Defensive Security consists of short video lessons that are organized into topical chapters. Each video is approximately 5-10 minutes in length and comes with a quick quiz to help you measure your learning. The course is completely self-paced. Watch lessons on your schedule whenever and wherever you want.
At the end of each chapter, you can complete a chapter test to see if you're ready to move on or have some material to review. Once you've completed the entire course, take the practice test and use the study tools in the course to prepare for the proctored final exam. You may take the proctored final exam whenever you are ready.
How Credit Recommendations Work
This course has been evaluated and recommended by ACE for 3 semester hours in the lower division baccalaureate degree category. To apply for transfer credit, follow these steps:
- If you already have a school in mind, check with the registrar to see if the school will grant credit for courses recommended by either ACE or NCCRS.
- Complete Computer Science 203: Defensive Security by watching video lessons and taking short quizzes.
- Take the Computer Science 203: Defensive Security final exam directly on the Study.com site.
- Request a transcript to be sent to the accredited school of your choice!
- Check out this page for more information on Study.com's credit-recommended courses.
|Introduction to Defensive Security||Explains computer security, hacking and information security.|
|Malicious Software Overview||Outlines different kinds of malware, computer viruses and ransomware, plus how to prevent computer spyware.|
|Networking Threats||Defines Denial of Service (DoS) attacks, session hijacking and pharming and spoofing attacks.|
|Risk Assessment & Vulnerability Management||Identifies the purpose of computer security risk assessments, vulnerability management and how to respond to security risks after an assessment.|
|Network Auditing & Monitoring||Discusses the purpose of network monitoring, protocol analyzers, capturing network traffic and auditing system security settings.|
|Computer Hardware Security||Details full disk encryption, mobile malware, mobile security and how to secure computer storage devices.|
|Media & Mobile Network Security||Covers network security threats, wireless network security issues and solutions and how to secure a wireless network.|
|Access Control Methods & Models||Explains access control lists, access control matrices and user account control (UAC).|
|Physical Data Security & Authentication Models||Describes Kerberos encryption types, virtual private networks (VPNs) and authentication for mobile devices.|
|Operating System & Virtualization Security||Outlines polices for operating system security, virtual machines and how virtual machines provide operating system functions.|
|Computer Application & Programming Security||Defines web browsers, proxy and content filtering, securing desktop/web applications and software testing.|
|Network Security Design||Discusses security zones, cloud computing and address translation.|
|Network Area Security||Identifies firewalls in network security, SSH proxy tunnels and methods of data loss prevention (DLP).|
|Encryption & Hashing||Covers asymmetric and symmetric encryption, RC4 encryption algorithms and the advanced encryption standard (AES).|
|Methods of Secure Online Communication||Details email encryption, dual-sided vs. single-sided certificates and accessing a server via SSH.|
|Failure Tolerance & Disaster Recovery||Discusses RAID arrays and data redundancy, physical security and environmental controls and IT disaster planning and recovery.|
|Social Engineering & Organizational Policies||Explains information security policy, social engineering and digital crime attacks.|
Learn more about the College Accelerator Plan
Confirm College Accelerator Upgrade?
- Unlimited access to all video lessons
- Lesson Transcripts
- Tech support
- Practice quizzes & tests
- Tools for tracking progress
- Personalized coaching
- Access to instructors
- Certificates of Completion
- Create Custom Courses
- Earn college credit
- Take two exams per month
- Finish official exams remotely
- Learn more
By upgrading now, you will immediately have access to all features associated with your new plan. Because the change is in the middle of your billing cycle, your next charge will include the prorated amount for the rest of this month. For more info check our FAQ's.
What to Expect For the Exam
This Study.com course has been evaluated and recommended for college credit. Once you've completed this course, you can take the proctored final exam and potentially earn credit. Follow the steps below to take the exam.
Before taking the exam, all of the following requirements must be met:
|A College Accelerator Study.com membership.|
|Completed all lessons in Computer Science 203: Defensive Security course and achieved 100% Quiz Progress.|
|Not attempted to take this exam within the last three days.|
|Have available proctored exams in this month of membership.|
|Have not taken this exam three times. (0/3)|
|Complete the exam readiness quiz.|
|Please note: Assignments are required to complete this course for credit. You have submitted / required assignments for this course.|
Please meet all of the pre-requirements in the Pre-Exam Checklist in order to take the exam.
Exam Process Details
1. Register For Exam
Registering for the exam is simple. First, be sure you meet the system requirements. Next, you'll need to agree to the academic integrity policy. Then just confirm your name and the exam name, and you're ready to go!
2. Download Software Secure
You'll receive an unique access code. Please write this down — you'll need it to take the exam. Then download Software Secure and follow the installation instructions.
3. Take Exam
The exam contains 50 - 100 multiple choice questions. You will have two hours to complete the exam, so don't start until you're sure you can complete the entire thing. And remember to pace yourself!
4. Get Exam Results
We will send you an email with your official exam results within 1 to 2 weeks. If you would like to raise your grade after receiving your exam results, you can retake quizzes with fewer than 3 attempts. You will then need to retake the final exam.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Research Schools, Degrees & Careers
Get the unbiased info you need to find the right school.
Browse Articles By Category
Browse an area of study or degree level.
- Biological and Biomedical Sciences
- Communications and Journalism
- Computer Sciences
- Culinary Arts and Personal Services
- Liberal Arts and Humanities
- Mechanic and Repair Technologies
- Medical and Health Professions
- Physical Sciences
- Transportation and Distribution
- Visual and Performing Arts
- Computer Science College Rankings
- Master of Computer Science: Computer Systems Security Degree Overview
- Associates Degrees in Computer Science with Course Information
- Top College in Tulsa for a Computer Science Degree
- How to Become a Computer Instructor
- Bachelor of Science (BS): Computer Systems Security Degree Overview
- Top University in Colorado Springs for a Computer Science Degree
- Top University in Greensboro, NC, for a Computer Science Degree
- Top University in Tampa for a Computer Science Degree Program
- Computer Science Masters Degree Programs with Course Info
- Answers and detailed explanations to each question
- Video lessons to explain complicated concepts
Explore our library of over 79,000 lessons
- College Courses
- High School Courses
- Other Courses
Request more information
Get in contact with one of our transfer advisors to learn how to earn transferable college credit for Computer Science 203: Defensive Security.