Cyber Security Fundamentals
- Offered byCoursera
Cyber Security Fundamentals at Coursera Overview
Duration | 22 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Cyber Security Fundamentals at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Beginner Level Good general knowledge of, and interest in, Information and Communications Technology
- Approx. 22 hours to complete
- English Subtitles: English
Cyber Security Fundamentals at Coursera Course details
- This course is intended to provide a general introduction to key concepts in cyber security
- It is aimed at anyone with a good general knowledge of information and communications technology
- The nature, scope and importance of cyber security are explained, and key concepts are justified and explored
- This includes examining the types of threat that cyber security must address, as well as the range of mechanisms, both technological and procedural, that can be deployed
- The role of cryptography in providing security is explored, including how algorithms and keys play their part in enabling cyber security
- The need for security management in an organisation is explained, and its main elements are introduced - including the key role played by risk management
- The importance of standardised approaches to security management is explained, as is the notion of compliance
Cyber Security Fundamentals at Coursera Curriculum
Cyber security basics
Getting started
Understanding security from experience
Goals of security
Addressing threats
What is CIA?
Using CIA to build security
Security for data in motion and at rest
Key ideas in the literature
Laying the foundations
Other ways of defining cyber security
Other approaches
Applying CIA to an organisation
Types of security
Getting the ideas right
Definitions
Review of concepts
CIA ? a basis for building security
Module 1 test
Cryptography ? the basics
A brief history
The role of keys
Guaranteeing integrity and authenticity
What encryption can and can't do
What is an algorithm?
Managing keys
Where does cryptography fit?
Common pitfalls
The need for cryptography
The scope of cryptography
Algorithms and cryptanalysis
PKI and key distrubution
Systems and protocols
What is cryptography?
What can cryptography do?
Common algorithms
Public, private and secret keys
Module 2 test
Security management
What is security management
Security policies and controls
Risk assessment and risk management
The ISMS
Other approaches
Responding to a security breach
Elements of security management
Approaches to managing risk
Using ISO/IEC 27001
Cyber Essentials and the NIST standards
Incident response management
Forms and procedures
Exploring key concepts
Understanding risk
Building an effective ISMS
The range of approaches
Module 3 test