課程信息
4.5
342 ratings
102 reviews
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals. After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry....
Globe

100% 在線課程

立即開始,按照自己的計劃學習。
Calendar

可靈活調整截止日期

根據您的日程表重置截止日期。
Beginner Level

初級

Clock

建議:6 hours/week

完成時間大約為13 小時
Comment Dots

English

字幕:English, Vietnamese

您將獲得的技能

Information SecurityCryptographyCybersecuritySecurity Management
Globe

100% 在線課程

立即開始,按照自己的計劃學習。
Calendar

可靈活調整截止日期

根據您的日程表重置截止日期。
Beginner Level

初級

Clock

建議:6 hours/week

完成時間大約為13 小時
Comment Dots

English

字幕:English, Vietnamese

教學大綱 - 您將從這門課程中學到什麼

1

章節
Clock
完成時間為 2 小時

Introduction to Information Security

...
Reading
4 個視頻(共 17 分鐘), 5 個閱讀材料, 4 個測驗
Video4 個視頻
The CIA Triad: Confidentiality Integrity and Availability2分鐘
A brief Introduction to the RMIAS model5分鐘
An introduction to knowledge areas in Information Security5分鐘
Reading5 個閱讀材料
An overview10分鐘
Information Security - What's that?10分鐘
It's not just IT10分鐘
A more comprehensive security model10分鐘
A brief introduction to cyber security knowledge areas10分鐘
Quiz4 個練習
Information and security4分鐘
Questions around the CIA Triad6分鐘
Derived from the RMIAS8分鐘
End of week test10分鐘

2

章節
Clock
完成時間為 3 小時

Introduction to Cryptography

This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built....
Reading
8 個視頻(共 45 分鐘), 6 個閱讀材料, 6 個測驗
Video8 個視頻
This video reviews the physical world security services that we need to replicate in cyberspace.6分鐘
This video introduces the core information security services and tools provided by cryptography.5分鐘
This video explains some core cryptographic concepts and introduces two different types of cryptography.8分鐘
This video discusses potential points of weakness in any system using cryptography.6分鐘
This video discusses how different types of cryptography are used in `real-world' applications.7分鐘
This video explains why control of cryptography presents society with a dilemma.8分鐘
Summary分鐘
Reading6 個閱讀材料
Everyday Cryptography 1.1.1 and 1.1.210分鐘
Everyday Cryptography 1.310分鐘
Everyday Cryptography 1.5.310分鐘
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5分鐘
Everyday Cryptography 5.1.1 and 5.1.210分鐘
Cryptography Wars10分鐘
Quiz6 個練習
Why cryptography?2分鐘
The cryptographic toolkit2分鐘
Algorithms and keys2分鐘
Breaking cryptosystems2分鐘
Use of cryptography2分鐘
The cryptography dilemma2分鐘

3

章節
Clock
完成時間為 2 小時

Network and Computer Security

Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks....
Reading
10 個視頻(共 36 分鐘), 1 個閱讀材料, 9 個測驗
Video10 個視頻
Computer Networks and Information3分鐘
Network Security Protocols4分鐘
Threats3分鐘
Network Security Systems3分鐘
Kinds of data2分鐘
Authentication and Authorisation3分鐘
Access Control3分鐘
System Vulnerabilities3分鐘
System Security Tools3分鐘
Reading1 個閱讀材料
Information and Networks10分鐘
Quiz9 個練習
Threats and Information2分鐘
Networks6分鐘
Network Security Protocols4分鐘
Threats4分鐘
Network Security Systems4分鐘
Kinds of Data10分鐘
Authentication and Authorisation6分鐘
Access Control4分鐘
System Vulnerabilities2分鐘

4

章節
Clock
完成時間為 2 小時

Security Management

...
Reading
8 個視頻(共 27 分鐘), 3 個閱讀材料, 7 個測驗
Video8 個視頻
The ISO27000 Family4分鐘
Security Policies2分鐘
Security Controls3分鐘
The Risk Management Process3分鐘
Risk Assessment2分鐘
Regulations and legal frameworks3分鐘
Incident Management3分鐘
Reading3 個閱讀材料
Chapter: Introduction to Information Security and ISO2700110分鐘
Risk Management and Assessment10分鐘
Laws affecting Information Security10分鐘
Quiz7 個練習
ISO 2700112分鐘
Security Policies4分鐘
Security Controls4分鐘
Risk Management4分鐘
Risk Assessment4分鐘
Law and Regulations2分鐘
Incident Management4分鐘
4.5
Direction Signs

30%

完成這些課程後已開始新的職業生涯
Briefcase

83%

通過此課程獲得實實在在的工作福利

熱門審閱

創建者 JNMay 28th 2018

This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.

創建者 HRSep 13th 2017

The course is well explained. Can follow without any prior knowledge. Can be considered as a strong foundation for Information Security field. Highly recommended.

講師

Professor Peter Komisarczuk

Programme Director
Information Security Group, Royal Holloway, University of London

Professor Keith M. Martin

Professor of Information Security
Information Security Group, Royal Holloway, University of London

Dr Jorge Blasco Alis

Lecturer in Information Security
Information Security Group, Royal Holloway, University of London

關於 University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

關於 Royal Holloway, University of London

Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law. ...

常見問題

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

還有其他問題嗎?請訪問 學生幫助中心