À propos de ce cours
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals. After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry.
Globe

Cours en ligne à 100 %

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Beginner Level

Niveau débutant

Clock

Approx. 13 heures pour terminer

Recommandé : 6 hours/week
Comment Dots

English

Sous-titres : English, Vietnamese

Compétences que vous acquerrez

Information SecurityCryptographyNetwork SecurityNetwork Management
Globe

Cours en ligne à 100 %

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Beginner Level

Niveau débutant

Clock

Approx. 13 heures pour terminer

Recommandé : 6 hours/week
Comment Dots

English

Sous-titres : English, Vietnamese

Syllabus - What you will learn from this course

1

Section
Clock
2 hours to complete

Introduction to Information Security

...
Reading
4 videos (Total 17 min), 5 readings, 4 quizzes
Video4 videos
The CIA Triad: Confidentiality Integrity and Availability2m
A brief Introduction to the RMIAS model5m
An introduction to knowledge areas in Information Security5m
Reading5 readings
An overview10m
Information Security - What's that?10m
It's not just IT10m
A more comprehensive security model10m
A brief introduction to cyber security knowledge areas10m
Quiz4 practice exercises
Information and security4m
Questions around the CIA Triad6m
Derived from the RMIAS8m
End of week test10m

2

Section
Clock
3 hours to complete

Introduction to Cryptography

This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built....
Reading
8 videos (Total 45 min), 6 readings, 6 quizzes
Video8 videos
This video reviews the physical world security services that we need to replicate in cyberspace.6m
This video introduces the core information security services and tools provided by cryptography.5m
This video explains some core cryptographic concepts and introduces two different types of cryptography.8m
This video discusses potential points of weakness in any system using cryptography.6m
This video discusses how different types of cryptography are used in `real-world' applications.7m
This video explains why control of cryptography presents society with a dilemma.8m
Summary0m
Reading6 readings
Everyday Cryptography 1.1.1 and 1.1.210m
Everyday Cryptography 1.310m
Everyday Cryptography 1.5.310m
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5m
Everyday Cryptography 5.1.1 and 5.1.210m
Cryptography Wars10m
Quiz6 practice exercises
Why cryptography?2m
The cryptographic toolkit2m
Algorithms and keys2m
Breaking cryptosystems2m
Use of cryptography2m
The cryptography dilemma2m

3

Section
Clock
2 hours to complete

Network and Computer Security

Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks....
Reading
10 videos (Total 36 min), 1 reading, 9 quizzes
Video10 videos
Computer Networks and Information3m
Network Security Protocols4m
Threats3m
Network Security Systems3m
Kinds of data2m
Authentication and Authorisation3m
Access Control3m
System Vulnerabilities3m
System Security Tools3m
Reading1 readings
Information and Networks10m
Quiz9 practice exercises
Threats and Information2m
Networks6m
Network Security Protocols4m
Threats4m
Network Security Systems4m
Kinds of Data10m
Authentication and Authorisation6m
Access Control4m
System Vulnerabilities2m

4

Section
Clock
2 hours to complete

Security Management

...
Reading
8 videos (Total 27 min), 3 readings, 7 quizzes
Video8 videos
The ISO27000 Family4m
Security Policies2m
Security Controls3m
The Risk Management Process3m
Risk Assessment2m
Regulations and legal frameworks3m
Incident Management3m
Reading3 readings
Chapter: Introduction to Information Security and ISO2700110m
Risk Management and Assessment10m
Laws affecting Information Security10m
Quiz7 practice exercises
ISO 2700112m
Security Policies4m
Security Controls4m
Risk Management4m
Risk Assessment4m
Law and Regulations2m
Incident Management4m

5

Section
Clock
3 hours to complete

The Cyber Security Industry and Careers

This last week presents a model of the information security industry as an introduction and then goes on to consider skills, roles, careers and finally professional bodies in our industry. ...
Reading
8 videos (Total 38 min), 10 readings, 3 quizzes
Video8 videos
The Producers6m
The Consumers3m
The enforcers and the adversaries6m
Introduction: roles and careers3m
Exploring roles and careers using the Inspired Careers website5m
Introducing SFIA5m
Professional bodies in the context of Information Security3m
Reading10 readings
A brief review10m
briefing for week 510m
Introduction10m
Basic elements in our model10m
More about producers and products10m
More about the consumers10m
Wrapping up the model10m
Careers in information Security10m
Skills Framework for the Information Age (SFIA)10m
A brief overview of professional bodies in the information security industry10m
Quiz3 practice exercises
Review questions12m
The information security industry model4m
Professional and ethical considerations10m
4.5
Direction Signs

30%

started a new career after completing these courses
Briefcase

83%

got a tangible career benefit from this course

Top Reviews

By JNMay 28th 2018

This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.

By JKJun 10th 2017

This course was a great introduction to information security. It was not so difficult but so easy to learn. it made me understand fundamental languages of this field.

Instructors

Avatar

Professor Peter Komisarczuk

Programme Director
Avatar

Professor Keith M. Martin

Professor of Information Security
Avatar

Dr Jorge Blasco Alis

Lecturer in Information Security

About University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

About Royal Holloway, University of London

Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law. ...

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • If you pay for this course, you will have access to all of the features and content you need to earn a Course Certificate. If you complete the course successfully, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. Note that the Course Certificate does not represent official academic credit from the partner institution offering the course.

  • Yes! Coursera provides financial aid to learners who would like to complete a course but cannot afford the course fee. To apply for aid, select "Learn more and apply" in the Financial Aid section below the "Enroll" button. You'll be prompted to complete a simple application; no other paperwork is required.

More questions? Visit the Learner Help Center