Information Security: Context and Introduction
Description
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
About this course: In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may …
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
About this course: In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals. After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry.
Created by: University of London-
Taught by: Professor Peter Komisarczuk, Programme Director
Information Security Group, Royal Holloway, University of London -
Taught by: Professor Keith M. Martin, Professor of Information Security
Information Security Group, Royal Holloway, University of London -
Taught by: Dr Jorge Blasco Alis, Lecturer in Information Security
Information Security Group, Royal Holloway, University of London
Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.
Help from your peersConnect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.
CertificatesEarn official recognition for your work, and share your success with friends, colleagues, and employers.
University of London The University of London is a federal University which includes 17 world leading Colleges. Our International Programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, search for 'London International'.Syllabus
WEEK 1
Introduction to Information Security
4 videos, 5 readings, 3 practice quizzes expand
- Reading: An overview
- Discussion Prompt: What are you hoping to achieve in this course?
- Video: What is Information Security?
- Reading: Information Security - What's that?
- Practice Quiz: Information and security
- Video: The CIA Triad: Confidentiality Integrity and Availability
- Reading: It's not just IT
- Practice Quiz: Questions around the CIA Triad
- Video: A brief Introduction to the RMIAS model
- Reading: A more comprehensive security model
- Practice Quiz: Derived from the RMIAS
- Video: An introduction to knowledge areas in Information Security
- Reading: A brief introduction to cyber security knowledge areas
- Discussion Prompt: What Knowledge Areas?
Graded: End of week test
WEEK 2
Introduction to Cryptography
This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built.
8 videos, 6 readings expand
- Video: Introduction
- Discussion Prompt: A non-digital environment
- Video: This video reviews the physical world security services that we need to replicate in cyberspace.
- Reading: Everyday Cryptography 1.1.1 and 1.1.2
- Video: This video introduces the core information security services and tools provided by cryptography.
- Reading: Everyday Cryptography 1.3
- Discussion Prompt: Security services
- Video: This video explains some core cryptographic concepts and introduces two different types of cryptography.
- Reading: Everyday Cryptography 1.5.3
- Discussion Prompt: Kerckhoffs’ principles
- Video: This video discusses potential points of weakness in any system using cryptography.
- Reading: Will superfast ‘quantum’ computers mean the end of unbreakable encryption?
- Discussion Prompt: Key management
- Reading: Everyday Cryptography 5.1.1 and 5.1.2
- Video: This video discusses how different types of cryptography are used in `real-world' applications.
- Discussion Prompt: SSL/TLS
- Reading: Cryptography Wars
- Video: This video explains why control of cryptography presents society with a dilemma.
- Discussion Prompt: The cryptography dilemma
- Video: Summary
Graded: Why cryptography?
Graded: The cryptographic toolkit
Graded: Algorithms and keys
Graded: Breaking cryptosystems
Graded: Use of cryptography
Graded: The cryptography dilemma
WEEK 3
Network and Computer Security
Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks.
10 videos, 1 reading, 2 practice quizzes expand
- Practice Quiz: Threats and Information
- Video: Introduction
- Video: Computer Networks and Information
- Reading: Information and Networks
- Video: Network Security Protocols
- Discussion Prompt: Other Network Security Protocols
- Video: Threats
- Video: Network Security Systems
- Discussion Prompt: Threats and Network Security Solutions
- Video: Kinds of data
- Practice Quiz: Kinds of Data
- Video: Authentication and Authorisation
- Discussion Prompt: Authentication Factors
- Video: Access Control
- Video: System Vulnerabilities
- Video: System Security Tools
- Discussion Prompt: Security Tools
Graded: Networks
Graded: Network Security Protocols
Graded: Threats
Graded: Network Security Systems
Graded: Authentication and Authorisation
Graded: Access Control
Graded: System Vulnerabilities
WEEK 4
Security Management
8 videos, 3 readings, 1 practice quiz expand
- Video: Why Security Management?
- Discussion Prompt: Why Security Management?
- Video: The ISO27000 Family
- Reading: Chapter: Introduction to Information Security and ISO27001
- Discussion Prompt: Other Information Security Management Frameworks
- Video: Security Policies
- Video: Security Controls
- Video: The Risk Management Process
- Video: Risk Assessment
- Practice Quiz: Risk Assessment
- Reading: Risk Management and Assessment
- Video: Regulations and legal frameworks
- Discussion Prompt: National Regulations
- Reading: Laws affecting Information Security
- Video: Incident Management
Graded: ISO 27001
Graded: Security Policies
Graded: Security Controls
Graded: Risk Management
Graded: Law and Regulations
Graded: Incident Management
WEEK 5
The Cyber Security Industry and Careers
This last week presents a model of the information security industry as an introduction and then goes on to consider skills, roles, careers and finally professional bodies in our industry.
8 videos, 10 readings, 1 practice quiz expand
- Reading: A brief review
- Discussion Prompt: What, in your opinion, is the most interesting aspect of Information Security?
- Reading: briefing for week 5
- Reading: Introduction
- Video: Building the information security industry model
- Reading: Basic elements in our model
- Video: The Producers
- Reading: about producers and products
- Video: The Consumers
- Reading: about the consumers
- Video: The enforcers and the adversaries
- Reading: Wrapping up the model
- Practice Quiz: The information security industry model
- Video: Introduction: roles and careers
- Reading: Careers in information Security
- Video: Exploring roles and careers using the Inspired Careers website
- Video: Introducing SFIA
- Reading: Skills Framework for the Information Age (SFIA)
- Discussion Prompt: What are the skills/roles that interest you most?
- Video: Professional bodies in the context of Information Security
- Reading: A brief overview of professional bodies in the information security industry
- Discussion Prompt: Security related professional bodies around the world
- Discussion Prompt: Your information security career
Graded: Review questions
Graded: Professional and ethical considerations
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.