Network Security and Defence: A History of IT
Learn about the history of IT, and deepen your understanding of cyber threats in this network security and defence course by Coventry University.
Duration
2 weeks
Weekly study
5 hours
100% online
How it works
Included in an ExpertTrack
Course 2 of 5
Get full ExpertTrack access
Find out more
Established
1992
Location
Coventry
This two-week course delves into five generations of IT and IS to provide you with a historical perspective on the development of technologies and better understanding of the emerging digital opportunities for organisations today.
Stepping back 80 years to vacuum tubes in the first generation of computers, this course will walk you through five generations of innovation. You’ll explore the invention of transistors, integrated circuits, microprocessors, and artificial intelligence. You’ll discover the history of computers and see just how far the IT industry has come.
Through a historical lens, you’ll have a chance to explore IT infrastructure, web servers, intranet, extranet, URLs, domain names, web systems, languages, application infrastructure and media standards. Understanding the history means you can better assess the vulnerabilities, historically and today.
In the second week of this course, you’ll look at evolving technologies such as cloud security, and evaluate common types of cyber threats. You’ll think about where they come from and how they’ve evolved, as well as non-web-based attacks.
By the end of the course, you should have a clearer understanding of network management and how it relates to cyber threats.
Welcome to a new week of Network Defence Management.
In this activity, we guide you through the five generations of computers and networks.
In this activity, we introduce you to the technical aspects of a computer network and ask you to consider the implications of legacy technology.
Reflect on the activities that you have done this week and find out what is coming up next week.
Introduction to Week 2.
In this activity, we introduce you to cloud technology and consider some of the security risks.
In this activity, we examine the range of cyber attacks, where they originate from and how they have evolved over recent years.
Review what you have learned during this short course and look at what's coming up next.
More courses you might like
Learners who joined this course have also enjoyed these courses.
©2025 onlincourse.com. All rights reserved