Free Course Image Computer systems security

Free online courseComputer systems security

Duration of the online course: 29 hours and 44 minutes

4.82

StarStarStarStarStar

(145)

Boost your cyber security skills with a free online course on system and web protection, network defenses, and real-world attacks—study fast and earn a certificate.

In this free course, learn about

  • Threat models, attacker goals/capabilities, and how to define security objectives
  • Control-hijacking attacks and why low-level C code is prone to memory corruption
  • Buffer overflow exploitation basics and defenses (stack canaries, ASLR, DEP, bounds checks)
  • Privilege separation: isolating components to reduce impact of bugs and limit authority
  • Capability-based security (e.g., Capsicum): least-privilege via unforgeable references and pitfalls
  • Sandboxing native code (Native Client): constraints, validation, and safe execution in browsers
  • Browser/web security model: origins, same-origin policy, permissions, and common browser roles
  • Web app security: typical vulnerabilities (e.g., XSS/CSRF/SQLi) and secure design practices
  • Symbolic execution for automated bug finding, path exploration, and security vulnerability discovery
  • Network security basics: why early TCP/IP assumed trust and common protocol design weaknesses
  • Authn and crypto protocols: Kerberos purpose plus SSL/TLS/HTTPS and forced-HTTPS protections
  • Side-channel attacks: leakage via timing/power/cache and real-world consequences
  • Privacy technologies: private browsing limits, anonymous communication motivations, and tracking defenses
  • Mobile/Android security: app sandboxing, permission model, and TaintDroid taint-tracking for data leaks

Course Description

Modern software lives under constant pressure from attackers, mistakes, and unexpected interactions between components. This free online course in Cyber Security helps you build a practical, systems-first understanding of how security fails and how to design software that holds up in the real world. You will learn to think in threat models, reason about what an attacker can and cannot do, and connect those assumptions to concrete technical decisions.

The course focuses on security at the level where vulnerabilities become impactful: memory safety, operating system boundaries, and application isolation. You will explore why low-level implementation choices matter, how control-flow hijacking and buffer overflows happen, and what defenses try to prevent or contain. From there, you will see how ideas like privilege separation, capabilities, and sandboxing reduce risk by limiting what code can access, even after a compromise. Rather than treating security as a checklist, the course trains you to treat it as architecture plus enforcement.

Security also depends on the platform around your software, especially the browser and the network. You will examine the web security model, common web application weaknesses, and why certain design constraints exist in the first place. On the network side, you will connect historical protocol decisions to today’s attack surface, then build intuition for how authentication and encrypted transport work in practice, including protocols such as Kerberos and the role of SSL and HTTPS in defending against interception and tampering.

The course goes beyond classic topics to cover areas that frequently surprise developers and analysts: symbolic execution for finding bugs systematically, side-channel attacks that leak information without breaking encryption, and privacy features like private browsing and anonymous communication. You will also look at security on mobile devices, how modern smartphone architectures isolate apps, and how data tracking can be observed and controlled. Finally, you will connect technical choices to real incentives through security economics, a crucial lens for anyone building or defending systems.

By the end, you should be able to analyze threats more clearly, spot common exploitation paths, and choose mitigations that match your environment. If you are preparing for a role in security engineering, secure software development, or cyber security analysis, this course offers a strong foundation you can apply immediately.

Course content

  • Video class: 1. Introduction, Threat Models 1h17m
  • Exercise: What is security?
  • Video class: 2. Control Hijacking Attacks 1h27m
  • Exercise: What is a reason why system software is often written in C?
  • Video class: 3. Buffer Overflow Exploits and Defenses 1h21m
  • Exercise: What is the allocation size for a pointer if the slot size is 16 bytes and the original allocation is 44 bytes in a baggy bounds system?
  • Video class: 4. Privilege Separation 1h23m
  • Exercise: What is the primary security benefit of using privilege separation in software systems?
  • Video class: 6. Capabilities 1h21m
  • Exercise: What is a primary concern of capability-based systems like Capsicum?
  • Video class: 7. Sandboxing Native Code 1h23m
  • Exercise: What is the primary advantage of using Native Client in web browsers?
  • Video class: 8. Web Security Model 1h22m
  • Exercise: Which one are examples of browser?
  • Video class: 9. Securing Web Applications 1h22m
  • Exercise: What was the primary security vulnerability demonstrated in the quick demo mentioned in the transcript?
  • Video class: 10. Symbolic Execution 1h22m
  • Exercise: What is Symbolic Execution primarily used for?
  • Video class: 11. Ur/Web 1h20m
  • Exercise: What is the main programming approach of Ur/Web?
  • Video class: 12. Network Security 1h18m
  • Exercise: What is a primary reason for original TCP/IP design vulnerabilities?
  • Video class: 13. Network Protocols 1h21m
  • Exercise: What is the main function of the Kerberos protocol?
  • Video class: 14. SSL and HTTPS 1h18m
  • Exercise: What does the forced HTTPS protocol primarily aim to prevent in web browsing?
  • Video class: 15. Medical Software 1h15m
  • Exercise: What is one of the great reasons for wireless medical device?
  • Video class: 16. Side-Channel Attacks 1h22m
  • Exercise: What can be a consequence of side-channel attacks?
  • Video class: 17. User Authentication 1h19m
  • Exercise: What is a password?
  • Video class: 18. Private Browsing 1h20m
  • Exercise: What is a common approach to enhancing privacy in private browsing modes?
  • Video class: 19. Anonymous Communication 1h20m
  • Exercise: Why companies use anonymity technologies?
  • Video class: 20. Mobile Phone Security 1h22m
  • Exercise: What is a key advantage of Android's security design over traditional systems?
  • Video class: 21. Data Tracking 1h19m
  • Exercise: What is the main function of TaintDroid in Android security?
  • Video class: 22. Guest Lecture by MIT IS&T 1h26m
  • Video class: 23. Security Economics 1h17m

This free course includes:

29 hours and 44 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

Course comments: Computer systems security

Students praised the course as great and informative, highlighting in-depth computer network security content. Some found it overwhelming due to heavy terminology and asked for a glossary and clearer explanations of key terms.

RT

Ransford Tetteh

StarStarStarStarStar

great course

KD

Khetre Dk

StarStarStarStarStar

Notice cource. if you know you know!!

SR

Shohanur Rahaman

StarStarStarStarStar

Thanks for classes We can do better.

SR

Shohanur Rahaman

StarStarStarStarStar

thanks for classes.

MA

MD ALIF HASSAN

good

SC

Samson Chigaru

StarStarStarStarStar

it was amazing to go through this course and good

DJ

Dennis Jim

StarStarStarStarStar

Indepth knowledge of computer network security.

JS

Johannes Sheriff

StarStarStarStar

Am lost. The terminologies are too much.

MW

Mackenzie Wise

StarStarStarStar

it's really difficult to keep up with all the terminology. A list of terms and their definitions would be extremely helpful.For example, what does heap mean? It's never really explained in detail. I'm only on episode 3 and I'm so lost ☹️. I'm so overwhelmed by the amount of knowledge I'm just expected to know.

More free courses at Cyber Security

Free Ebook + Audiobooks! Learn by listening or reading!

Download the App now to have access to + 5000 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 60 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate