À propos de ce cours
4.5
342 ratings
102 reviews
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals. After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry....
Globe

Cours en ligne à 100 %

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Calendar

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Beginner Level

Niveau débutant

Clock

Recommandé : 6 hours/week

Approx. 13 heures pour terminer
Comment Dots

English

Sous-titres : English, Vietnamese

Compétences que vous acquerrez

Information SecurityCryptographyCybersecuritySecurity Management
Globe

Cours en ligne à 100 %

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Calendar

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Beginner Level

Niveau débutant

Clock

Recommandé : 6 hours/week

Approx. 13 heures pour terminer
Comment Dots

English

Sous-titres : English, Vietnamese

Programme du cours : ce que vous apprendrez dans ce cours

1

Section
Clock
2 heures pour terminer

Introduction to Information Security

...
Reading
4 vidéos (Total 17 min), 5 lectures, 4 quiz
Video4 vidéos
The CIA Triad: Confidentiality Integrity and Availability2 min
A brief Introduction to the RMIAS model5 min
An introduction to knowledge areas in Information Security5 min
Reading5 lectures
An overview10 min
Information Security - What's that?10 min
It's not just IT10 min
A more comprehensive security model10 min
A brief introduction to cyber security knowledge areas10 min
Quiz4 exercices pour s'entraîner
Information and security4 min
Questions around the CIA Triad6 min
Derived from the RMIAS8 min
End of week test10 min

2

Section
Clock
3 heures pour terminer

Introduction to Cryptography

This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built....
Reading
8 vidéos (Total 45 min), 6 lectures, 6 quiz
Video8 vidéos
This video reviews the physical world security services that we need to replicate in cyberspace.6 min
This video introduces the core information security services and tools provided by cryptography.5 min
This video explains some core cryptographic concepts and introduces two different types of cryptography.8 min
This video discusses potential points of weakness in any system using cryptography.6 min
This video discusses how different types of cryptography are used in `real-world' applications.7 min
This video explains why control of cryptography presents society with a dilemma.8 min
Summary min
Reading6 lectures
Everyday Cryptography 1.1.1 and 1.1.210 min
Everyday Cryptography 1.310 min
Everyday Cryptography 1.5.310 min
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5 min
Everyday Cryptography 5.1.1 and 5.1.210 min
Cryptography Wars10 min
Quiz6 exercices pour s'entraîner
Why cryptography?2 min
The cryptographic toolkit2 min
Algorithms and keys2 min
Breaking cryptosystems2 min
Use of cryptography2 min
The cryptography dilemma2 min

3

Section
Clock
2 heures pour terminer

Network and Computer Security

Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks....
Reading
10 vidéos (Total 36 min), 1 lecture, 9 quiz
Video10 vidéos
Computer Networks and Information3 min
Network Security Protocols4 min
Threats3 min
Network Security Systems3 min
Kinds of data2 min
Authentication and Authorisation3 min
Access Control3 min
System Vulnerabilities3 min
System Security Tools3 min
Reading1 lecture
Information and Networks10 min
Quiz9 exercices pour s'entraîner
Threats and Information2 min
Networks6 min
Network Security Protocols4 min
Threats4 min
Network Security Systems4 min
Kinds of Data10 min
Authentication and Authorisation6 min
Access Control4 min
System Vulnerabilities2 min

4

Section
Clock
2 heures pour terminer

Security Management

...
Reading
8 vidéos (Total 27 min), 3 lectures, 7 quiz
Video8 vidéos
The ISO27000 Family4 min
Security Policies2 min
Security Controls3 min
The Risk Management Process3 min
Risk Assessment2 min
Regulations and legal frameworks3 min
Incident Management3 min
Reading3 lectures
Chapter: Introduction to Information Security and ISO2700110 min
Risk Management and Assessment10 min
Laws affecting Information Security10 min
Quiz7 exercices pour s'entraîner
ISO 2700112 min
Security Policies4 min
Security Controls4 min
Risk Management4 min
Risk Assessment4 min
Law and Regulations2 min
Incident Management4 min
4.5
Direction Signs

30%

a commencé une nouvelle carrière après avoir terminé ces cours
Briefcase

83%

a bénéficié d'un avantage concret dans sa carrière grâce à ce cours

Meilleurs avis

par JNMay 28th 2018

This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.

par HRSep 13th 2017

The course is well explained. Can follow without any prior knowledge. Can be considered as a strong foundation for Information Security field. Highly recommended.

Enseignants

Professor Peter Komisarczuk

Programme Director
Information Security Group, Royal Holloway, University of London

Professor Keith M. Martin

Professor of Information Security
Information Security Group, Royal Holloway, University of London

Dr Jorge Blasco Alis

Lecturer in Information Security
Information Security Group, Royal Holloway, University of London

À propos de University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

À propos de Royal Holloway, University of London

Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law. ...

Foire Aux Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.