CSCA 5403: Basic Ideas in Computing Security

Get a head start on program admission

 Preview this course in the non-credit experience today! 
Start working toward program admission and requirements right away. Work you complete in the non-credit experience will transfer to the for-credit experience when you upgrade and pay tuition. See How It Works for details.

  • Course Type: Elective
  • Specialization: Introduction to Cybersecurity
  • Instructors: Dr. Ahmed Hamza
  • Prior knowledge needed: Students should consider their background in Java and begin appropriate tutorial study at a level needed to allow use of the language in course projects (suggested resources are provided).

 View on Coursera

Course Description

This course teaches fundamental concepts in computing security, focusing on cross-cutting concepts spanning: vulnerability metrics and terminology, utilizing open source intelligence, authentication mechanisms and authorization/access control protocols. You can expect to gain fundamental concepts and practical skills that will put you on the path to completing the Computing Security specialization, and dive deeper into any sub-field within the realm.

Learners from all backgrounds will benefit, especially those who have little experience with Unix access control and the command-line shell. The course offers a unique insight into several areas of research and practice in the world of cybersecurity.

Learning Outcomes

  • Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  • Apply computer science theory and software development fundamentals to produce computing-based solutions. 

Course Grading Policy

AssessmentPercentage of GradeAI Usage Policy
1 Ungraded Lab0%Limited
6  Assignments60% (4 assignments; 12.5% each) (2 assignments; 5% each)Limited
Final Exam40%Limited

Course Content

Duration: 3 hours, 8 minutes

An introduction to the world of cybersecurity terminology, objectives, and the contrast between vulnerabilities/bugs and weakness enumeration in the security community. Learn how vulnerabilities are scored using objective, quantitative measures of impact. 

Duration: 1 hours, 32 minutes

Discover what organizations keep track of known, actively exploited vulnerabilities and malware campaigns, and how to use that information to make decisions affecting critical systems. We discuss how prioritization is not always a simple quantitative procedure. Also find out how to use public tools to quickly check any un-trusted files, URLs, and file signatures against hundreds of anti-malware engines and community notes. 

Duration: 2 hours, 47 minutes

What are the main factors of authentication based on? What is multi-factor authentication, and how does it relate to authentication protocols? How can authentication factors be vulnerable even when based on advanced tech? 

Duration: 57 minutes

Maintaining access control is a critical feature of security and a driving force of all cryptographic systems. Here we explore two basic forms of authorization models (Mandatory and Discretionary), and dive into the world of Unix filesystem access control as an example of the latter. 

Duration: 1 hour, 47 minutes

This module contains materials for the proctored final exam for MS-CS degree students. If you've upgraded to the for-credit version of this course, please make sure you review the additional for-credit materials in the Introductory module and anywhere else they may be found. 

Notes

  • Cross-listed Courses: Courses that are offered under two or more programs. Considered equivalent when evaluating progress toward degree requirements. You may not earn credit for more than one version of a cross-listed course.
  • Page Updates: This page is periodically updated. Course information on the Coursera platform supersedes the information on this page. Click the View on Coursera button above for the most up-to-date information.