Security in computing

From, Cloud to Crypto and AI driven concepts, learn advanced security techniques.

(SEC-COMP.AP1) / ISBN : 978-1-64459-585-5
This course includes
Lessons
TestPrep
Hands-On Labs
Get A Free Trial

About This Course

The Security in Computing course offers a detailed introduction to cybersecurity fundamentals covering modern security policies and processes. Discover the core concepts of authentication, access control, complexities of cloud security and ethical considerations. Learn how to identify potential threats and execute safety measures to protect your systems, data, and network. Additionally, this course is aligned with ‘Security in Computing, 6th Edition’ ebook and offers up-to-date examples from real world scenarios and hands-on Labs for you to practice and solidify your learnings.

Skills You’ll Get

  • Deep understanding of security fundamentals like threats, vulnerabilities, and controls
  • Implement security measures that include authentication, access control, cryptography, and firewalls
  • Identify potential threats in systems, networks, and applications
  • Expertise in risk assessment and mitigation
  • Familiarity with legal and ethical implications in the IT landscape
  • Skilled for handling security incidents effectively

Interactive Lessons

15+ Interactive Lessons | 302+ Exercises | 100+ Quizzes | 668+ Flashcards | 668+ Glossary of terms

Gamified TestPrep

13+ Pre Assessment Questions |

Hands-On Labs

45+ LiveLab | 00+ Minutes

1

Preface

  • Why Read This Course?
  • Uses and Users of this Course
  • Organization of This Course
  • How to Read This Course
  • What Is New in This Edition
2

Introduction

  • What Is Computer Security?
  • Threats
  • Harm
  • Vulnerabilities
  • Controls
  • Conclusion
  • What’s Next?
  • Exercises
3

Toolbox: Authentication, Access Control, and Cryptography

  • Authentication
  • Access Control
  • Cryptography
  • Conclusion
  • Exercises
4

Programs and Programming

  • Unintentional (Nonmalicious) Programming Oversights
  • Malicious Code—Malware
  • Countermeasures
  • Conclusion
  • Exercises
5

The Internet—User Side

  • Browser Attacks
  • Attacks Targeting Users
  • Obtaining User or Website Data
  • Mobile Apps
  • Email and Message Attacks
  • Conclusion
  • Exercises
6

Operating Systems

  • Security in Operating Systems
  • Security in the Design of Operating Systems
  • Rootkits
  • Conclusion
  • Exercises
7

Networks

  • Network Concepts
  • Threats to Network Communications
  • Wireless Network Security
  • Denial of Service
  • Distributed Denial of Service
  • Cryptography in Network Security
  • Firewalls
  • Intrusion Detection and Prevention Systems
  • Network Management
  • Conclusion
  • Exercises
8

Data and Databases

  • Introduction to Databases
  • Security Requirements of Databases
  • Reliability and Integrity
  • Database Disclosure
  • Data Mining and Big Data
  • Conclusion
  • Exercises
9

New Territory

  • Introduction
  • Cloud Architectures and Their Security
  • IoT and Embedded Devices
  • Cloud, IoT, and Embedded Devices—The Smart Home
  • Smart Cities, IoT, Embedded Devices, and Cloud
  • Cloud, IoT, and Critical Services
  • Conclusion
  • Exercises
10

Privacy

  • Privacy Concepts
  • Privacy Principles and Policies
  • Authentication and Privacy
  • Data Mining
  • Privacy on the Internet
  • Email and Message Security
  • Privacy Impacts of Newer Technologies
  • Conclusion
  • Exercises
11

Management and Incidents

  • Security Planning
  • Business Continuity Planning
  • Handling Incidents
  • Risk Analysis
  • Physical Threats to Systems
  • New Frontiers in Security Management
  • Conclusion
  • Exercises
12

Legal Issues and Ethics

  • Protecting Programs and Data
  • Information and the Law
  • Rights of Employees and Employers
  • Redress for Software Failures
  • Computer Crime
  • Ethical Issues in Computer Security
  • An Ethical Dive into Artificial Intelligence
  • Incident Analyses with Ethics
  • Conclusion
  • Exercises
13

Details of Cryptography

  • Cryptology
  • Symmetric Encryption Algorithms
  • Asymmetric Encryption
  • Message Digests
  • Digital Signatures
  • Quantum Key Distribution
  • Conclusion
14

Emerging Topics

  • AI and Cybersecurity
  • Blockchains and Cryptocurrencies
  • Offensive Cyber and Cyberwarfare
  • Quantum Computing and Computer Security
  • Conclusion
15

Bibliography

3

Toolbox: Authentication, Access Control, and Cryptography

  • Performing Dictionary Attack using Cain & Abel
  • Using Social Engineering Techniques to Plan an Attack
  • Using Rainbow Tables for Cracking Passwords
  • Enabling an Access Control List
  • Examining PKI Certificates
  • Examining Asymmetric Encryption
  • Performing Symmetric Encryption
  • Adding a Digital Certificate
4

Programs and Programming

  • Defending Against a Buffer Overflow Attack
  • Hiding Text using Steganography
  • Creating a Remote Access Trojan (RAT)
  • Scanning and Classifying Different Types of Viruses
  • Configuring the Windows Defender Settings
5

The Internet—User Side

  • Exploiting a Website Using SQL Injection
  • Attacking a Website Using XSS Injection
  • Creating PGP Certification
  • Observing a SHA256-Generated Hash Value
  • Performing a Phishing Attack
6

Operating Systems

  • Setting up a Honeypot
  • Detecting Rootkits
7

Networks

  • Performing Packet Sniffing
  • Performing Nmap Port Scanning
  • Securing a Wi-Fi Hotspot
  • Configuring a Wireless AP
  • Using a Wireless AP for MAC Address Filtering
  • Confirming the Spoofing Attack in Wireshark
  • Conducting a DoS Attack Using Smurf Attack
  • Launching a DoS Attack
  • Performing Session Hijacking Using Burp Suite
  • Simulating the DDoS Attack
  • Configuring a VPN
  • Configuring IPSec
  • Using Packet Filtering to Restrict Sites
  • Configuring Network Address Translation
  • Configuring a Network Firewall
  • Enabling Intrusion Detection and Prevention
8

Data and Databases

  • Retrieving Data from a Table
  • Inserting Data into a Table
  • Creating a Table in SQL
  • Updating the Table Data
10

Privacy

  • Examining Spyware
11

Management and Incidents

  • Taking an Incremental Backup
  • Taking a Full Backup
13

Details of Cryptography

  • Creating Asymmetric Key Pairs
  • Observing an MD5-Generated Hash Value

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

This course focuses on the principles, practices, and techniques involved in protecting computer systems, networks, and data from various threats. You’ll gain the skills and knowledge needed to safeguard your digital assets.

Yes, you’ll learn about the legal and ethical issues and implications of security in Information Technology in detail.

As cybersecurity threats are increasing and becoming more sophisticated, organizations worldwide are now seeking skilled professionals for handling these issues. Completing this computer security course can open doors to many such rewarding career opportunities for you.

Yes, this ‘Security in Computing’ course can help you with the baseline study while building on a strong foundation in the fundamental concepts, principles, and techniques that are needed for passing cybersecurity certifications.

Yes, this course covers security challenges and solutions related to new technologies like cloud computing and IoT.

Gain Job-Relevant Cyber Security Skills 

  Learn advanced techniques of cyber security against emerging threats.

$ 419.85

Buy Now

Related Courses

All Course
scroll to top