Network Security and Defence: A History of IT

Learn about the history of IT, and deepen your understanding of cyber threats in this network security and defence course by Coventry University.

Duration

2 weeks

Weekly study

5 hours

100% online

How it works

Included in an ExpertTrack

Course 2 of 5

Get full ExpertTrack access

Find out more

Established

1992

Location

Coventry

Develop your understanding of the IT industry and network security

This two-week course delves into five generations of IT and IS to provide you with a historical perspective on the development of technologies and better understanding of the emerging digital opportunities for organisations today.

Discover the history of IT, from vacuum tubes to AI

Stepping back 80 years to vacuum tubes in the first generation of computers, this course will walk you through five generations of innovation. You’ll explore the invention of transistors, integrated circuits, microprocessors, and artificial intelligence. You’ll discover the history of computers and see just how far the IT industry has come.

Apply history to modern cyber security

Through a historical lens, you’ll have a chance to explore IT infrastructure, web servers, intranet, extranet, URLs, domain names, web systems, languages, application infrastructure and media standards. Understanding the history means you can better assess the vulnerabilities, historically and today.

Explore real-world cyber threats and cloud security

In the second week of this course, you’ll look at evolving technologies such as cloud security, and evaluate common types of cyber threats. You’ll think about where they come from and how they’ve evolved, as well as non-web-based attacks.

By the end of the course, you should have a clearer understanding of network management and how it relates to cyber threats.

  • Week 1

    Historical Context

    • Welcome to Network Defence Management: A History of IT

      Welcome to a new week of Network Defence Management.

    • A history of Information Technology (IT) and Information Systems (IS)

      In this activity, we guide you through the five generations of computers and networks.

    • Computer networks

      In this activity, we introduce you to the technical aspects of a computer network and ask you to consider the implications of legacy technology.

    • Summary

      Reflect on the activities that you have done this week and find out what is coming up next week.

  • Week 2

    Technology Changes and Cyber Threats

    • Welcome to Week 2

      Introduction to Week 2.

    • Cloud technology

      In this activity, we introduce you to cloud technology and consider some of the security risks.

    • Cyber threats

      In this activity, we examine the range of cyber attacks, where they originate from and how they have evolved over recent years.

    • A summary of the course

      Review what you have learned during this short course and look at what's coming up next.

More courses you might like

Learners who joined this course have also enjoyed these courses.

©2025  onlincourse.com. All rights reserved