Computer Security Fundamentals (5th Edition)

Build a strong foundation in computer security fundamentals with this in-demand course based on Pearson IT Certifications' trusted resource.

(COMP-SEC-FUNDA.AB1) / ISBN : 978-1-64459-416-2
This course includes
Hands-On Labs
AI Tutor (Add-on)
Get A Free Trial

About This Course

Computer Security Fundamentals (5e)" offers an introduction to cybersecurity, ideal for students seeking a launchpad for their careers, system administrators looking to improve their skill set, or anyone comfortable with computers who wants to navigate the digital world more safely. This course explores core security concepts, network and internet vulnerabilities, cyber threats like malware, and methods to defend against them.

Skills You’ll Get

  • A solid understanding of fundamental computer security principles.
  • The ability to identify potential security vulnerabilities in networks and internet infrastructure.
  • Knowledge of different cyber threats like malware and DoS attacks, along with defensive strategies.
  • The skills to implement effective security policies and procedures to safeguard systems and data.
  • Awareness of real-world threats like cyberterrorism and best practices for online safety.

Get the support you need. Enroll in our Instructor-Led Course.


17+ Lessons | 302+ Exercises | 255+ Quizzes | 108+ Flashcards | 108+ Glossary of terms


100+ Pre Assessment Questions | 100+ Post Assessment Questions |

Hands-On Labs

29+ LiveLab | 29+ Video tutorials | 46+ Minutes



  • About This eBook

Introduction to Computer Security

  • Introduction
  • How Seriously Should You Take Threats to Network Security?
  • Identifying Types of Threats
  • Assessing the Likelihood of an Attack on Your Network
  • Basic Security Terminology
  • Concepts and Approaches
  • How Do Legal Issues Impact Network Security?
  • Online Security Resources
  • Summary

Networks and the Internet

  • Introduction
  • Network Basics
  • How the Internet Works
  • History of the Internet
  • Basic Network Utilities
  • Other Network Devices
  • Advanced Network Communications Topics
  • Cloud Computing
  • Summary

Cyber Stalking, Fraud, and Abuse

  • Introduction
  • How Internet Fraud Works
  • Identity Theft
  • Cyber Stalking
  • Protecting Yourself Against Cybercrime
  • Summary

Denial of Service Attacks

  • Introduction
  • DoS Attacks
  • Illustrating an Attack
  • Common Tools Used for DoS Attacks
  • DoS Weaknesses
  • Specific DoS Attacks
  • Real-World Examples of DoS Attacks
  • How to Defend Against DoS Attacks
  • Summary


  • Introduction
  • Viruses
  • Trojan Horses
  • The Buffer-Overflow Attack
  • Spyware
  • Other Forms of Malware
  • Detecting and Eliminating Viruses and Spyware
  • Summary

Techniques Used by Hackers

  • Introduction
  • Basic Terminology
  • The Reconnaissance Phase
  • Actual Attacks
  • Malware Creation
  • Penetration Testing
  • The Dark Web
  • Summary

Industrial Espionage in Cyberspace

  • Introduction
  • What Is Industrial Espionage?
  • Information as an Asset
  • Real-World Examples of Industrial Espionage
  • How Does Espionage Occur?
  • Protecting Against Industrial Espionage
  • Trade Secrets
  • The Industrial Espionage Act
  • Spear Phishing
  • Summary


  • Introduction
  • Cryptography Basics
  • History of Encryption
  • Modern Cryptography Methods
  • Public Key (Asymmetric) Encryption
  • PGP
  • Legitimate Versus Fraudulent Encryption Methods
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Steganography
  • Cryptanalysis
  • Cryptography Used on the Internet
  • Quantum Computing Cryptography
  • Summary

Computer Security Technology

  • Introduction
  • Virus Scanners
  • Firewalls
  • Antispyware
  • IDSs
  • Digital Certificates
  • Virtual Private Networks
  • Wi-Fi Security
  • Summary

Security Policies

  • Introduction
  • What Is a Policy?
  • Important Standards
  • Defining User Policies
  • Defining System Administration Policies
  • Security Breaches
  • Defining Access Control
  • Development Policies
  • Standards, Guidelines, and Procedures
  • Disaster Recovery
  • Zero Trust
  • Important Laws
  • Summary

Network Scanning and Vulnerability Scanning

  • Introduction
  • Basics of Assessing a System
  • Securing Computer Systems
  • Scanning Your Network
  • Testing and Scanning Standards
  • Getting Professional Help
  • Summary

Cyber Terrorism and Information Warfare

  • Introduction
  • Actual Cases of Cyber Terrorism
  • Weapons of Cyber Warfare
  • Economic Attacks
  • Military Operations Attacks
  • General Attacks
  • Supervisory Control and Data Acquisitions (SCADA)
  • Information Warfare
  • Actual Cases of Cyber Terrorism
  • Future Trends
  • Defense Against Cyber Terrorism
  • Terrorist Recruiting and Communication
  • TOR and the Dark Web
  • Summary

Cyber Detective

  • Introduction
  • General Searches
  • Company Searches
  • Court Records and Criminal Checks
  • Usenet
  • Google
  • Maltego
  • Summary

Introduction to Forensics

  • Introduction
  • General Guidelines
  • Finding Evidence on a PC
  • Finding Evidence in System Logs
  • Getting Back Deleted Files
  • Operating System Utilities
  • The Windows Registry
  • Mobile Forensics: Cell Phone Concepts
  • The Need for Forensic Certification
  • Expert Witnesses
  • Additional Types of Forensics
  • Summary

Cybersecurity Engineering

  • Introduction
  • Defining Cybersecurity Engineering
  • Standards
  • SecML
  • Modeling
  • Summary

Appendix A: Resources

  • General Computer Crime and Cyber Terrorism
  • General Knowledge
  • Cyber Stalking
  • Identity Theft
  • Port Scanners and Sniffers
  • Password Crackers
  • Countermeasures
  • Cyber Investigation Tools
  • General Tools
  • Virus Research


Networks and the Internet

  • Using the tracert command
  • Using the ping Command
  • Using Routes
  • Using the netstat command
  • Using ARP
  • Using the ipconfig Command
  • Using the nslookup command for Passive Reconnaissance

Cyber Stalking, Fraud, and Abuse

  • Performing a Phishing Attack

Denial of Service Attacks

  • Performing DoS Attacks with an SYN Flood
  • Performing a DHCP Starvation Attack
  • Simulating the DDoS Attack with an SYN Flood
  • Protecting Yourself from the DOS Attack


  • Detecting Viruses using Windows Defender
  • Creating a RAT
  • Using eLiTeWrap

Techniques Used by Hackers

  • Using nmap for Network Enumeration
  • Cracking a Password Using the John the Ripper Tool


  • Creating PGP Certification
  • Observing the SHA-Generated Hash Value
  • Using Rainbow Tables
  • Using Steganography

Computer Security Technology

  • Configuring Snort

Network Scanning and Vulnerability Scanning

  • Configuring Iptables to Block ICMP Packets
  • Disabling a Service
  • Performing an MBSA Scan

Introduction to Forensics

  • Observing the Security Event log
  • Using openfiles and net sessions
  • Using the fc command
  • Exporting the Registry Keys

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact us now

Computer Security Fundamentals are the core concepts and principles that form the foundation of protecting information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. They involve understanding threats, vulnerabilities, controls, and mitigation strategies.

There are several types and practices that help protect systems and data. Lets explore five key areas:

  • Cloud security
  • Infrastructure security
  • Application security
  • Network security
  • Internet of Things (IoT) security

  • Confidentiality: Ensuring information remains accessible only to authorized users.
  • Integrity: Guaranteeing data accuracy and completeness, preventing unauthorized modification.
  • Availability: Making sure authorized users can access information and systems when needed.
  • Authentication: Verifying the identity of users or systems attempting to access resources.

Strengthen Your Cybersecurity Skills. Strengthen Your Resume.

Learn to identify and combat cyber threats like malware, DoS attacks, and even cyberterrorism, to thrive in an ever-evolving cyber environment.


Buy Now

Related Courses

All Course
scroll to top