Information Security: Context and Introduction

  • 4.7
Approx. 24 hours to complete

Course Summary

This course teaches students about the fundamentals of information security and data protection. It provides an introduction to key concepts and principles of information security, including risk management, cryptography, and network security.

Key Learning Points

  • Learn the principles and concepts of information security and data protection
  • Understand the risks and threats to information security
  • Discover the best practices for securing networks and systems

Related Topics for further study


Learning Outcomes

  • Understand the basic principles and concepts of information security
  • Identify and analyze risks and threats to information security
  • Develop effective strategies and best practices for securing networks and systems

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of computer systems and networks
  • Familiarity with programming concepts

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced course
  • Video lectures and quizzes
  • Estimated completion time: 21 hours

Similar Courses

  • Introduction to Cybersecurity
  • Cryptography and Information Security

Related Education Paths


Notable People in This Field

  • Security Technologist
  • Cryptographer

Related Books

Description

In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts.

Outline

  • Introduction to Information Security
  • What is Information Security?
  • The CIA Triad: Confidentiality Integrity and Availability
  • A brief Introduction to the RMIAS model
  • An introduction to knowledge areas in Information Security
  • An overview
  • Information Security - What's that?
  • It's not just IT
  • A more comprehensive security model
  • A brief introduction to cyber security knowledge areas
  • Information and security
  • Questions around the CIA Triad
  • Derived from the RMIAS
  • End of week test
  • Introduction to Cryptography
  • Introduction
  • This video reviews the physical world security services that we need to replicate in cyberspace.
  • This video introduces the core information security services and tools provided by cryptography.
  • This video explains some core cryptographic concepts and introduces two different types of cryptography.
  • This video discusses potential points of weakness in any system using cryptography.
  • This video discusses how different types of cryptography are used in `real-world' applications.
  • This video explains why control of cryptography presents society with a dilemma.
  • Summary
  • Everyday Cryptography 1.1.1 and 1.1.2
  • Everyday Cryptography 1.3
  • Everyday Cryptography 1.5.3
  • Will superfast ‘quantum’ computers mean the end of unbreakable encryption?
  • Everyday Cryptography 5.1.1 and 5.1.2
  • Cryptography Wars
  • Why cryptography?
  • The cryptographic toolkit
  • Algorithms and keys
  • Breaking cryptosystems
  • Use of cryptography
  • The cryptography dilemma
  • Network and Computer Security
  • Introduction
  • Computer Networks and Information
  • Network Security Protocols
  • Threats
  • Network Security Systems
  • Kinds of data
  • Authentication and Authorisation
  • Access Control
  • System Vulnerabilities
  • System Security Tools
  • Information and Networks
  • Threats and Information
  • Networks
  • Network Security Protocols
  • Threats
  • Network Security Systems
  • Kinds of Data
  • Authentication and Authorisation
  • Access Control
  • System Vulnerabilities
  • Security Management
  • Why Security Management?
  • The ISO27000 Family
  • Security Policies
  • Security Controls
  • The Risk Management Process
  • Risk Assessment
  • Regulations and legal frameworks
  • Incident Management
  • Chapter: Introduction to Information Security and ISO27001
  • Risk Management and Assessment
  • Laws affecting Information Security
  • ISO 27001
  • Security Policies
  • Security Controls
  • Risk Management
  • Risk Assessment
  • Law and Regulations
  • Incident Management
  • The Cyber Security Industry and Careers
  • Building the information security industry model
  • The Producers
  • The Consumers
  • The enforcers and the adversaries
  • Introduction: roles and careers
  • Exploring roles and careers using the Inspired Careers website
  • Introducing SFIA
  • Professional bodies in the context of Information Security
  • A brief review
  • briefing for week 5
  • Introduction
  • Basic elements in our model
  • More about producers and products
  • More about the consumers
  • Wrapping up the model
  • Careers in information Security
  • Skills Framework for the Information Age (SFIA)
  • A brief overview of professional bodies in the information security industry
  • Review questions
  • The information security industry model
  • Professional and ethical considerations

Summary of User Reviews

Discover the world of information security with Coursera's Information Security and Risk Management course. Students rave about the course's comprehensive coverage of the topic, practical exercises, and engaging lectures. The course has received high praise for its ability to translate complex concepts into easily digestible information.

Key Aspect Users Liked About This Course

The course's ability to translate complex concepts into easily digestible information.

Pros from User Reviews

  • Comprehensive coverage of information security
  • Practical exercises to reinforce learning
  • Engaging lectures that keep students interested
  • Expert instructors with real-world experience

Cons from User Reviews

  • Some users felt that the course was too basic for their needs
  • The course may not be suitable for those with advanced knowledge of information security
  • Some users felt that the course lacked depth in certain areas
  • The course may not be challenging enough for experienced professionals
English
Available now
Approx. 24 hours to complete
Professor Peter Komisarczuk, Professor Keith M. Martin, Dr Jorge Blasco Alis
University of London, Royal Holloway, University of London
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses