Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.


Introduction to Cybersecurity Essentials

IBM via Coursera


With this beginner friendly course, learn fundamental Cybersecurity skills that are crucial for anyone using computing devices and connecting to the Internet. You will first learn to recognize common security threats and risks that individuals and organizations may face, such as theft, tampering, and destruction of sensitive information. You’ll then discover the characteristics of cyber-attacks and learn how you can employ best practices to guard against them. Next, you’ll learn about the best practices against cyberattacks. These include using strong passwords, good password management, and multi-factor authentication. You’ll learn ways in which you can strengthen your security plan with techniques like device hardening, encryption and more. You’ll then learn about safe browsing practices. You’ll gain an understanding of why you must practice safe browsing; to protect yourself against hackers, phishing, identity theft, security leaks, privacy issues and more. You’ll also explore methods for securing and managing confidential information. Then, discover how to configure browsers to help reduce security breaches. Throughout this course you will complete many hands-on labs which will enhance your understanding of course material. At the end of this course, you will have the opportunity to complete a final project where you will demonstrate your proficiency in cybersecurity. Designed specifically for beginners and those who are interested in a Cybersecurity Specialist or Analyst roles as well as entry-level roles in Information Security (Infosec) engineering. This course dives into the world of cybersecurity to give you the critical skills employers need. It also supports the needs of technical and IT support roles, who can find themselves on the front lines of defense for cybersecurity issues.


  • Common Security Threats and Risks
    • Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks typically include business interruptions or the theft, tampering, or destruction of sensitive information. Ransomware attacks are on the rise and are predicted to cost victims more than $265 billion (USD) annually by 2031. And that is just one type of threat we all need to protect against. The need for organizations to implement effective security practices has never been more important or urgent. This module will teach you the skills you need to identify basic security threats and choose the best security practices to address those threats. This week, you’ll learn the difference between data, information, and insights and how companies leverage all three to help guide their business decisions. You’ll learn how to maintain data integrity and keep data confidential. You’ll also begin to learn about the different types of attacks and breaches that threaten today’s organizations and their data.
  • Security Best Practices 
    • Unfortunately, there’s no single solution for effective cybersecurity. The best practice is to use multiple layers of security. Some great first steps you can take to improve security and build a solid foundation to protect against cyberattacks are to use strong passwords, good password management, and multi-factor authentication. You should also limit access to data and resources to only those people who need them. Your security plan can be further rounded out and strengthened by using techniques such as device hardening, and encryption, and by educating employees about cyberthreats as a regular part of their training.  This week, you’ll learn more about security, including password management, creating effective passwords, and securing devices. You’ll learn the differences between authentication, authorization, and accounting, and how these concepts help secure devices and validate logons. You’ll also learn how encryption can help secure data transmissions and how to manage email and spam.
  • Safe Browsing Practices
    • From people, to computers, to mobile phones, and the Internet of Things, everything is connected. Today there are more devices than people. For some, mobile phones and tablets have replaced traditional desktop computers and laptops. The web is where people and businesses get things done and it’s always on, 24 hours a day. The Internet can be an awesome place to go for entertainment, learning, and other online experiences. But the Internet isn’t safe. Hackers, phishing, identity theft, security leaks, privacy issues, and more are valid reasons to consistently practice safe browsing to protect yourself. This week, you will learn about safety concerns with applications and public browsing, including managing plug-ins, extensions, and toolbars. You will learn about web browser security configurations, cookies, and computer caches.
  • Final Quiz
    • In this module, you’ll assess your course knowledge through a final quiz based on the previous four modules.

Taught by

Skills Network


4.8 rating at Coursera based on 475 ratings

Start your review of Introduction to Cybersecurity Essentials

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.