Information Security: Context and Introduction

Location type
Logo Coursera
Provider rating: starstarstarstar_borderstar_border 6.3 Coursera has an average rating of 6.3 (out of 4 reviews)

Need more information? Get more details on the site of the provider.

Description

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may …

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. Send an Email to info@springest.com

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals. After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry.

Created by:  University of London
  • Taught by:  Professor Peter Komisarczuk, Programme Director

    Information Security Group, Royal Holloway, University of London
  • Taught by:  Professor Keith M. Martin, Professor of Information Security

    Information Security Group, Royal Holloway, University of London
  • Taught by:  Dr Jorge Blasco Alis, Lecturer in Information Security

    Information Security Group, Royal Holloway, University of London
Level Beginner Language English, Subtitles: Vietnamese How To Pass Pass all graded assignments to complete the course. User Ratings 4.5 stars Average User Rating 4.5See what learners said Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from your peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

University of London The University of London is a federal University which includes 17 world leading Colleges. Our International Programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, search for 'London International'.

Syllabus


WEEK 1


Introduction to Information Security



4 videos, 5 readings, 3 practice quizzes expand


  1. Reading: An overview
  2. Discussion Prompt: What are you hoping to achieve in this course?
  3. Video: What is Information Security?
  4. Reading: Information Security - What's that?
  5. Practice Quiz: Information and security
  6. Video: The CIA Triad: Confidentiality Integrity and Availability
  7. Reading: It's not just IT
  8. Practice Quiz: Questions around the CIA Triad
  9. Video: A brief Introduction to the RMIAS model
  10. Reading: A more comprehensive security model
  11. Practice Quiz: Derived from the RMIAS
  12. Video: An introduction to knowledge areas in Information Security
  13. Reading: A brief introduction to cyber security knowledge areas
  14. Discussion Prompt: What Knowledge Areas?

Graded: End of week test

WEEK 2


Introduction to Cryptography
This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built.


8 videos, 6 readings expand


  1. Video: Introduction
  2. Discussion Prompt: A non-digital environment
  3. Video: This video reviews the physical world security services that we need to replicate in cyberspace.
  4. Reading: Everyday Cryptography 1.1.1 and 1.1.2
  5. Video: This video introduces the core information security services and tools provided by cryptography.
  6. Reading: Everyday Cryptography 1.3
  7. Discussion Prompt: Security services
  8. Video: This video explains some core cryptographic concepts and introduces two different types of cryptography.
  9. Reading: Everyday Cryptography 1.5.3
  10. Discussion Prompt: Kerckhoffs’ principles
  11. Video: This video discusses potential points of weakness in any system using cryptography.
  12. Reading: Will superfast ‘quantum’ computers mean the end of unbreakable encryption?
  13. Discussion Prompt: Key management
  14. Reading: Everyday Cryptography 5.1.1 and 5.1.2
  15. Video: This video discusses how different types of cryptography are used in `real-world' applications.
  16. Discussion Prompt: SSL/TLS
  17. Reading: Cryptography Wars
  18. Video: This video explains why control of cryptography presents society with a dilemma.
  19. Discussion Prompt: The cryptography dilemma
  20. Video: Summary

Graded: Why cryptography?
Graded: The cryptographic toolkit
Graded: Algorithms and keys
Graded: Breaking cryptosystems
Graded: Use of cryptography
Graded: The cryptography dilemma

WEEK 3


Network and Computer Security
Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks.


10 videos, 1 reading, 2 practice quizzes expand


  1. Practice Quiz: Threats and Information
  2. Video: Introduction
  3. Video: Computer Networks and Information
  4. Reading: Information and Networks
  5. Video: Network Security Protocols
  6. Discussion Prompt: Other Network Security Protocols
  7. Video: Threats
  8. Video: Network Security Systems
  9. Discussion Prompt: Threats and Network Security Solutions
  10. Video: Kinds of data
  11. Practice Quiz: Kinds of Data
  12. Video: Authentication and Authorisation
  13. Discussion Prompt: Authentication Factors
  14. Video: Access Control
  15. Video: System Vulnerabilities
  16. Video: System Security Tools
  17. Discussion Prompt: Security Tools

Graded: Networks
Graded: Network Security Protocols
Graded: Threats
Graded: Network Security Systems
Graded: Authentication and Authorisation
Graded: Access Control
Graded: System Vulnerabilities

WEEK 4


Security Management



8 videos, 3 readings, 1 practice quiz expand


  1. Video: Why Security Management?
  2. Discussion Prompt: Why Security Management?
  3. Video: The ISO27000 Family
  4. Reading: Chapter: Introduction to Information Security and ISO27001
  5. Discussion Prompt: Other Information Security Management Frameworks
  6. Video: Security Policies
  7. Video: Security Controls
  8. Video: The Risk Management Process
  9. Video: Risk Assessment
  10. Practice Quiz: Risk Assessment
  11. Reading: Risk Management and Assessment
  12. Video: Regulations and legal frameworks
  13. Discussion Prompt: National Regulations
  14. Reading: Laws affecting Information Security
  15. Video: Incident Management

Graded: ISO 27001
Graded: Security Policies
Graded: Security Controls
Graded: Risk Management
Graded: Law and Regulations
Graded: Incident Management

WEEK 5


The Cyber Security Industry and Careers
This last week presents a model of the information security industry as an introduction and then goes on to consider skills, roles, careers and finally professional bodies in our industry.


8 videos, 10 readings, 1 practice quiz expand


  1. Reading: A brief review
  2. Discussion Prompt: What, in your opinion, is the most interesting aspect of Information Security?
  3. Reading: briefing for week 5
  4. Reading: Introduction
  5. Video: Building the information security industry model
  6. Reading: Basic elements in our model
  7. Video: The Producers
  8. Reading: about producers and products
  9. Video: The Consumers
  10. Reading: about the consumers
  11. Video: The enforcers and the adversaries
  12. Reading: Wrapping up the model
  13. Practice Quiz: The information security industry model
  14. Video: Introduction: roles and careers
  15. Reading: Careers in information Security
  16. Video: Exploring roles and careers using the Inspired Careers website
  17. Video: Introducing SFIA
  18. Reading: Skills Framework for the Information Age (SFIA)
  19. Discussion Prompt: What are the skills/roles that interest you most?
  20. Video: Professional bodies in the context of Information Security
  21. Reading: A brief overview of professional bodies in the information security industry
  22. Discussion Prompt: Security related professional bodies around the world
  23. Discussion Prompt: Your information security career

Graded: Review questions
Graded: Professional and ethical considerations
There are no reviews yet.

Share your review

Do you have a learning experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. Send an Email to info@springest.com