Information Security: Context and Introduction

2.4
2.4 rating

In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts.

The course concludes with a discussion around a simple model of the information security industry and explores skills knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.

After completing the course you will have gained an awareness of key information security principles regarding information confidentiality integrity and availability. You will be able to explain some of the key aspects of information risk and security management in addition summarise some of the key aspects in computer and network security including some appreciation of threats attacks exploits and vulnerabilities. You will also gain an awareness of some of the skills knowledge and roles/careers opportunities within the information security industry.

WEEK 1
2 hours to complete
Introduction to Information Security
4 videos (Total 17 min) 5 readings 4 quizzes

WEEK 2
3 hours to complete
Introduction to Cryptography
This module introduces cryptography which provides a toolkit for implementing the core security services upon which all information security technologies are built.
8 videos (Total 45 min) 6 readings 6 quizzes

WEEK 3
2 hours to complete
Network and Computer Security
Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module you will learn how the security of information can be put at risk and what we can do to mitigate these risks.
10 videos (Total 36 min) 1 reading 9 quizzes

WEEK 4
2 hours to complete
Security Management
8 videos (Total 27 min) 3 readings 7 quizzes

WEEK 5
3 hours to complete
The Cyber Security Industry and Careers
This last week presents a model of the information security industry as an introduction and then goes on to consider skills roles careers and finally professional bodies in our industry.
8 videos (Total 38 min) 10 readings 3 quizzes


Tham gia đánh giá khóa học

Nếu bạn đã học qua khóa học này thì mời bạn tham gia đóng góp ý kiến và đánh giá để cộng đồng bạn học có thêm thông tin tham khảo.

Cung cấp bởi: Coursera /  University of London

Thời lượng: 11 hours
Ngôn ngữ giảng dạy: Tiếng Anh
Chi phí: Miễn phí / 0
Đối tượng: Beginner

Thông tin về nhà cung cấp

Coursera (/ kərˈsɛrə /) là một nền tảng học tập trực tuyến toàn cầu được thành lập vào năm 2012 bởi 2 giáo sư khoa học máy tính của đại học Stanford là Andrew NgDaphne Koller, nền tảng này cung cấp các khóa học trực tuyến (MOOC) cho cộng đồng người học online.

Coursera hợp tác với các trường đại học danh tiếng tại Bắc Mỹ và trên khắp thế giới, cùng với nhiều tổ chức khác để cung cấp các khóa học trực tuyến chất lượng, theo chuyên ngành và được cấp chứng chỉ trong nhiều lĩnh vực như kỹ thuật, khoa học dữ liệu, học máy, toán học, kinh doanh, khoa học máy tính, tiếp thị kỹ thuật số, nhân văn, y học, sinh học, khoa học xã hội , và nhiều ngành khác.

Các khóa học cùng chủ đề

Secure Networked System with Firewall and IDS

In this MOOC we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security constructing a dual-firewall...

Azure Infrastructure Fundamentals

Microsoft Azure is a service created by Microsoft to provide cloud computing for creating and managing applications and services using a cloud environment. Azure provides software as a service (SaaS)...

Identifying Security Vulnerabilities in C/C++Programming

This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities courses one and two in this specialization. This course uses...

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to Top