Information Security: Context and Introduction
- Offered byCoursera
Information Security: Context and Introduction at Coursera Overview
Duration | 14 hours |
Mode of learning | Online |
Difficulty level | Beginner |
Credential | Certificate |
Information Security: Context and Introduction at Coursera Highlights
- 41% got a tangible career benefit from this course
- Transcripts available in English, Vietnamese, Arabic
- Earn a certificate upon successful completion
- Learn from expert professors of University of London
Information Security: Context and Introduction at Coursera Course details
- After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry.
- In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.
Information Security: Context and Introduction at Coursera Curriculum
Week 1: Introduction to Information Security
What is Information Security?
The CIA Triad: Confidentiality Integrity and Availability
A brief Introduction to the RMIAS model
An introduction to knowledge areas in Information Security
Week 2: Introduction to Cryptography
Introduction
This video reviews the physical world security services that we need to replicate in cyberspace
This video introduces the core information security services and tools provided by cryptography
This video explains some core cryptographic concepts and introduces two different types of cryptography
This video discusses potential points of weakness in any system using cryptography
This video discusses how different types of cryptography are used in `real-world' applications
This video explains why control of cryptography presents society with a dilemma
Summary
Week 3: Network and Computer Security
Introduction
Computer Networks and Information
Network Security Protocols
Threats
Network Security Systems
Kinds of data
Authentication and Authorisation
Access Control
System Vulnerabilities
System Security Tools
Week 4: Security Management
Why Security Management?
The ISO27000 Family
Security Policies
Security Controls
The Risk Management Process
Risk Assessment
Regulations and legal frameworks
Incident Management
Week 5: The Cyber Security Industry and Careers
Building the information security industry model
The Producers
The Consumers
The enforcers and the adversaries
Introduction: roles and careers
Exploring roles and careers using the Inspired Careers website
Introducing SFIA
Professional bodies in the context of Information Security