Duration of the online course: 29 hours and 44 minutes
Modern software lives under constant pressure from attackers, mistakes, and unexpected interactions between components. This free online course in Cyber Security helps you build a practical, systems-first understanding of how security fails and how to design software that holds up in the real world. You will learn to think in threat models, reason about what an attacker can and cannot do, and connect those assumptions to concrete technical decisions.
The course focuses on security at the level where vulnerabilities become impactful: memory safety, operating system boundaries, and application isolation. You will explore why low-level implementation choices matter, how control-flow hijacking and buffer overflows happen, and what defenses try to prevent or contain. From there, you will see how ideas like privilege separation, capabilities, and sandboxing reduce risk by limiting what code can access, even after a compromise. Rather than treating security as a checklist, the course trains you to treat it as architecture plus enforcement.
Security also depends on the platform around your software, especially the browser and the network. You will examine the web security model, common web application weaknesses, and why certain design constraints exist in the first place. On the network side, you will connect historical protocol decisions to today’s attack surface, then build intuition for how authentication and encrypted transport work in practice, including protocols such as Kerberos and the role of SSL and HTTPS in defending against interception and tampering.
The course goes beyond classic topics to cover areas that frequently surprise developers and analysts: symbolic execution for finding bugs systematically, side-channel attacks that leak information without breaking encryption, and privacy features like private browsing and anonymous communication. You will also look at security on mobile devices, how modern smartphone architectures isolate apps, and how data tracking can be observed and controlled. Finally, you will connect technical choices to real incentives through security economics, a crucial lens for anyone building or defending systems.
By the end, you should be able to analyze threats more clearly, spot common exploitation paths, and choose mitigations that match your environment. If you are preparing for a role in security engineering, secure software development, or cyber security analysis, this course offers a strong foundation you can apply immediately.
29 hours and 44 minutes of online video course
Digital certificate of course completion (Free)
Exercises to train your knowledge
100% free, from content to certificate
Ready to get started?Download the app and get started today.
Install the app now
to access the courseOver 5,000 free courses
Programming, English, Digital Marketing and much more! Learn whatever you want, for free.
Study plan with AI
Our app's Artificial Intelligence can create a study schedule for the course you choose.
From zero to professional success
Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.
You can also use the QR Code or the links below.

Free CourseCompTIA Security course
26h11m
41 exercises

Free CourseInformation Security Management Fundamentals
2h55m
15 exercises

Free CourseAdvanced Topics in Cryptography
22h34m
9 exercises

Free CourseIT Security
15h04m
18 exercises

Free CourseCyber security
2h07m
24 exercises

Free CourseInformation security lessons
7h15m
11 exercises

Free CourseIntroduction to Cybersecurity
7h43m
6 exercises

Free CourseCyber Security Masterclass
1h36m
6 exercises

Free CourseCyber security full course
11h06m

Free CourseCyber Security full course
11h03m
Thousands of online courses in video, ebooks and audiobooks.
To test your knowledge during online courses
Generated directly from your cell phone's photo gallery and sent to your email
Download our app via QR Code or the links below::.
+ 10 million
students
Free and Valid
Certificate
60 thousand free
exercises
4.8/5 rating in
app stores
Free courses in
video and ebooks
Course comments: Computer systems security
Students praised the course as great and informative, highlighting in-depth computer network security content. Some found it overwhelming due to heavy terminology and asked for a glossary and clearer explanations of key terms.
Ransford Tetteh
great course
Khetre Dk
Notice cource. if you know you know!!
Shohanur Rahaman
Thanks for classes We can do better.
Shohanur Rahaman
thanks for classes.
MD ALIF HASSAN
good
Samson Chigaru
it was amazing to go through this course and good
Dennis Jim
Indepth knowledge of computer network security.
Johannes Sheriff
Am lost. The terminologies are too much.
Mackenzie Wise
it's really difficult to keep up with all the terminology. A list of terms and their definitions would be extremely helpful.For example, what does heap mean? It's never really explained in detail. I'm only on episode 3 and I'm so lost ☹️. I'm so overwhelmed by the amount of knowledge I'm just expected to know.