- Learn about the parts of computers and how they work together.
After completing this module, you'll be able to:
Identify the parts of a computer
Understand identity on networks
Explain how VPNs work and are used
Identify the parts of a web address
- Describes the fundamentals of computers and how they work on both a small and large scale.
After completing this module, you'll be able to:
Identify the parts of a computer
Explain how the parts of a computer work together
Analyze small and large networks
Describe the differences between authentication and authorization
- Explores the history of computing and programming and surveys how modern programming evolved from the early days.
After completing this module, you'll be able to:
Outline computing history
Survey the early days of programming
Explain modern programming techniques
Summarize the importance of accessibility
- Explore security
After completing this module, you'll be able to:
Analyze the need for computer security
Summarize how modern computers verify identity
Describe how biometrics work
Explain how hackers try to disrupt security
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Syllabus
- Discover the basics of computing
- Introduction
- Explore the basics of computers
- Discover computer networking
- Investigate identity on a network
- Examine identity on the internet
- Describe virtual private networks
- Examine web addresses
- Module assessment
- Summary
- Explore computers
- Introduction
- Explore personal computers
- Investigate processors
- Examine random access memory
- Understand storage
- Describe networking
- Research data centers for cloud computing
- Inspect directory authorization
- Module assessment
- Summary
- Investigate the history of app development
- Introduction
- Research computing history
- Explore programming history
- Investigate modern programming
- Inspect modern cloud structure
- Explore accessibility
- Module assessment
- Summary
- Explore security
- Introduction
- Explore identity
- Research cloud identity
- Investigate two factor security
- Inspect biometrics
- Understand bad actors
- Module assessment
- Summary