Introduction To Computer Science Security

February 3, 2017 | Views: 10553

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Introduction to Computer Science Security Tutorial

Estimated reading time: 2 minutes

Welcome to this crash course on security. My aim for this tutorial is to fill the gap between the academic courses (knowledge) part and real life scenario (practical) part. My motivation for doing this tutorial is based on personal issues I experienced during my studies.

This tutorial will be divided into two parts as mentioned above:

  1. Academic – knowledge based
  2. Real Life Scenario – practical based

In the academic part, we will explore the history of cryptography, modern cryptography and its application.

In real life scenarios, we will establish simple examples of security applications in real life, and/or use the current examples given by Cybrary.

Nowadays, security is a hot and interesting subject for good and bad reasons.  It is one of the more important subjects in Computer Science studies. The importance of security grows rapidly due to the emergence of new technologies. Currently, technology is involved in almost every aspect of our lives.

In order to study and understand security, there are a few prerequisite courses, and I will divide them into three parts:

  • MATH
  • OS
  • Programming

Math, seriously?! Oh my gosh 😀 Yea it’s true. Math is almost the magical entrance for studying almost every field in computer science and since we are studying security, math is considered the core of it. But, before you panic, don’t worry. I promise I will make it as simple as I can.

The second prerequisite is Operating Systems. You should have a good understanding of operating systems in order to know which mechanisms you are dealing with.

The third is programming languages (our tools) to translate our academic knowledge to real application. Yes, this is the part where it gets fun. Unfortunately, it doesn’t really get fun until the end but persevere and it will be rewarding.

That’s all for now. I hope you liked the tutorial and found it interesting and helpful. Please send suggestions or modifications to what I mentioned.

N.B: at every part of this tutorial I will support you with the references and additional resources if available.

Thank you

XorInsomnia

Come back soon for the next installment!

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
32 Comments
  1. im happy to finally know the truth about my husband infidelities all these years…and promised Mich to share his contact to anyone in need of same help after getting all the evidence and proofs on my husband’s phone….
    contact michackersolution@ gmailcom for any real Hacking job has my experience online with hackers have really been frustrating until i met Mich.….within some few hours he was able to reveal all the real truth of his infidelities and lies on fb,whatsap, emails and instagr without touching the phone
    you can call, text or whatsap him on his contact +16282043675

    gq

Page 4 of 4«1234
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel