Lecture

Security, Continued

In this module, students learn about defenses against cyber threats and how to secure their information. Key topics include:

  • Defensive strategies: scrubbing data, using firewalls, and proxy servers.
  • The importance of VPNs and cryptography for secure communications.
  • Utilizing virus scanners and understanding product registration and activation.

By the end of this module, students will know how to implement various security measures to safeguard their digital presence.


Course Lectures
  • Hardware
    David J. Malan

    The first module introduces essential computer hardware concepts, including:

    • Computation basics and data representation (bits and bytes).
    • Understanding ASCII and how it encodes text.
    • Exploring processors and their role in computing.
    • Motherboard components: buses, connectors, ports, and sockets.
    • Memory types: ROM, RAM, and cache, and their functions.

    Students will gain a foundational understanding of the physical components that comprise a computer system.

  • Hardware, Continued
    David J. Malan

    This module continues exploring hardware, focusing on secondary storage and expansion options. Topics include:

    • Types of storage: floppy disks, hard disks (PATA and SATA), CDs, and DVDs.
    • The concept of virtual memory and its importance.
    • Expansion buses and cards, including AGP, ISA, and PCI standards.
    • Input/Output devices and peripherals, essential for user interaction.
    • Tips on how to effectively shop for a computer.

    Students will develop a deeper understanding of computer components and how to make informed purchasing decisions.

  • The Internet
    David J. Malan

    This module delves into the Internet, covering vital concepts about networks and communication protocols. Key topics include:

    • Types of networks: client-server and peer-to-peer models.
    • Understanding LANs and WLANs, their functions, and advantages.
    • Email protocols: IMAP, POP, and SMTP, along with netiquette and spam management.
    • The World Wide Web, focusing on URLs, HTTP, and the significance of blogs and instant messaging.
    • Exploring Usenet and SSH fundamentals.

    Students will gain insights into the backbone of online communication and how the Internet operates.

  • The Internet, Continued
    David J. Malan

    The continuation of the Internet module focuses on advanced network concepts and infrastructure:

    • Exploring network topologies and their implications for connectivity.
    • The Internet's backbone, discussing TCP/IP, DHCP, and DNS.
    • Understanding NAT and its role in network security.
    • Ethernet technology: NICs, cabling, switches, routers, and access points.
    • Wireless communication technologies including IR, RF, Bluetooth, and WiFi.
    • Different types of ISPs and modems: dial-up, cable, and DSL.

    This module equips students with comprehensive knowledge necessary for navigating the complexities of networking.

  • Multimedia
    David J. Malan

    This module introduces multimedia elements critical to modern computing. Key areas of focus include:

    • Understanding graphics: file formats, bitmap vs. vector graphics, and the importance of compression.
    • Exploring audio file formats and the concept of audio compression.
    • Video formats and compression techniques for efficient storage.
    • Streaming technologies and their impact on multimedia delivery.

    Students will learn how to effectively utilize multimedia in various applications, enhancing their digital literacy.

  • Security
    David J. Malan

    This security module examines various threats to privacy and security in the digital realm. Topics include:

    • Privacy threats: understanding cookies, logs, and data recovery.
    • Common security risks: packet sniffing, phishing attacks, and hacking.
    • Recognizing and defending against viruses, worms, spyware, and zombies.
    • Discussing piracy, particularly WaReZ and cracking issues.

    Students will develop an understanding of the risks they face online and how to protect themselves.

  • Security, Continued
    David J. Malan

    In this module, students learn about defenses against cyber threats and how to secure their information. Key topics include:

    • Defensive strategies: scrubbing data, using firewalls, and proxy servers.
    • The importance of VPNs and cryptography for secure communications.
    • Utilizing virus scanners and understanding product registration and activation.

    By the end of this module, students will know how to implement various security measures to safeguard their digital presence.