In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts.
Information Security: Context and Introduction伦敦大学
The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk
Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18).
- 5 stars
- 4 stars
- 3 stars
- 2 stars
- 1 star
來自INFORMATION SECURITY: CONTEXT AND INTRODUCTION的熱門評論
Through Coursera, I can now become a cyber physical security expert. With their online course, I have had basic knowledge in information security. I encourage others to join their online program.
Excellent intro course. I'm giving 4 stars just because it tackle security mostly as an organizational/company issue and it doesn't explicitly include personal security/privacy into account.
This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.
Good insights into concepts and methodologies involved in establishing a secure Information Management System based on the CIA model with Intrusion detection and prevention protocols.