Wouldn't setting up a port on the router to forward all the requests to a computer on the network make that particular computer vulnerable?
In the strictest sense, but effectively only on that port (assuming you're speaking about genuine port forwarding and not generally insecure home router "DMZ" settings). This is where the security of the software listening on that port comes in. Assuming the software is configured correctly and doesn't have any unpatched vulnerabilities (bugs) for an attacker to exploit, it's likely relatively safe to expose that port/device.
"[...]you lose that layer of security for that computer: it is now completely open to incoming connections from the internet, so you need to secure it as if it was directly connected.
As already pointed out in the comments, this part is not in regards to typical port forwarding (where a single or very specific range of ports is specified to be forwarded) but home router "DMZ" settings. "Port forwarding" generally filters all requests that aren't specifically sent to the forwarded ports whereas the "DMZ" settings typically forward all connections period, with no filtering, etc. whatsoever. Think of the difference as like unlocking your front door and sitting next to it versus leaving every door and window in your home unlocked and wide open while you're on vacation.
Of course, any time you forward a port, the computer at the receiving end becomes vulnerable on that specific port. So make sure you run up-to-date software that is well configured."
Keeping software up to date and well-configured means the vulnerabilities an attacker might exploit (as mentioned in the first paragraph of this answer) are patched in updates or are otherwise unavailable and thus are ideally no longer usable for gaining access to the remote system.
How can security be ensured in such a case because as far as I know all security tools such as firewalls, etc. are set up on the router?
Beyond correct software configuration and security patches, firewalls, etc. can also live either on the receiving PC itself (think Windows firewall) or even on a dedicated e.g. firewall device between the router and the PC (so the router would actually forward to this device, then the device would pass the filtered connection(s) along to the server). While certainly not the only example of this kind of thing, Sophos UTM Home is an example of software you can install on a dedicated device (e.g. an old PC) to provide this kind of security.