Skip to main content

HarvardX: CS50's Introduction to Cybersecurity

An introduction to cybersecurity for technical and non-technical audiences alike.

CS50's Introduction to Cybersecurity
5 weeks
2–6 hours per week
Self-paced
Progress at your own speed
Free
Optional upgrade available

There is one session available:

151,717 already enrolled! After a course session ends, it will be archivedOpens in a new tab.
Starts Apr 12
Ends Dec 31

About this course

Skip About this course

This is CS50's introduction to cybersecurity for technical and non-technical audiences alike. Learn how to protect your own data, devices, and systems from today's threats and how to recognize and evaluate tomorrow's as well, both at home and at work. Learn to view cybersecurity not in absolute terms but relative, a function of risks and rewards (for an adversary) and costs and benefits (for you). Learn to recognize cybersecurity as a trade-off with usability itself. Course presents both high-level and low-level examples of threats, providing students with all they need know technically to understand both. Assignments inspired by real-world events.

At a glance

  • Language: English
  • Video Transcripts: اَلْعَرَبِيَّةُ, Deutsch, English, Español, Français, हिन्दी, Bahasa Indonesia, Português, Kiswahili, తెలుగు, Türkçe, 中文
  • Associated skills:Cyber Security, Usability

What you'll learn

Skip What you'll learn
  • hacking, cracking
  • social engineering, phishing attacks
  • passcodes, passwords, SSO
  • brute-force attacks, dictionary attacks
  • biometrics
  • multi-factor authentication, password managers
  • ethical hacking
  • (distributed) denial-of-service attacks
  • viruses, worms, botnets
  • SQL injection attacks
  • port-scanning
  • proxies, firewalls
  • automatic updates
  • closed-source, open-source software
  • buffer-overflow attacks
  • secure deletion
  • hashing, salting
  • secret-key, public-key encryption, digital signatures
  • full-disk encryption, ransomware
  • cookies, sessions, incognito mode
  • anonymization, de-identification
  • verification
  • operating systems, app stores

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.