課程信息
4.5
408 個評分
113 個審閱
100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為14 小時

建議:7 hours/week...
可選語言

英語(English)

字幕:英語(English), 越南語, 阿拉伯語(Arabic)

您將獲得的技能

CybersecurityCryptographyInformation Security (INFOSEC)Security Management
100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為14 小時

建議:7 hours/week...
可選語言

英語(English)

字幕:英語(English), 越南語, 阿拉伯語(Arabic)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間(小時)
完成時間為 2 小時

Introduction to Information Security

...
Reading
4 個視頻 (總計 17 分鐘), 5 個閱讀材料, 4 個測驗
Video4 個視頻
The CIA Triad: Confidentiality Integrity and Availability2分鐘
A brief Introduction to the RMIAS model5分鐘
An introduction to knowledge areas in Information Security5分鐘
Reading5 個閱讀材料
An overview10分鐘
Information Security - What's that?10分鐘
It's not just IT10分鐘
A more comprehensive security model10分鐘
A brief introduction to cyber security knowledge areas10分鐘
Quiz4 個練習
Information and security4分鐘
Questions around the CIA Triad6分鐘
Derived from the RMIAS8分鐘
End of week test10分鐘
2
完成時間(小時)
完成時間為 3 小時

Introduction to Cryptography

This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built....
Reading
8 個視頻 (總計 45 分鐘), 6 個閱讀材料, 6 個測驗
Video8 個視頻
This video reviews the physical world security services that we need to replicate in cyberspace.6分鐘
This video introduces the core information security services and tools provided by cryptography.5分鐘
This video explains some core cryptographic concepts and introduces two different types of cryptography.8分鐘
This video discusses potential points of weakness in any system using cryptography.6分鐘
This video discusses how different types of cryptography are used in `real-world' applications.7分鐘
This video explains why control of cryptography presents society with a dilemma.8分鐘
Summary分鐘
Reading6 個閱讀材料
Everyday Cryptography 1.1.1 and 1.1.210分鐘
Everyday Cryptography 1.310分鐘
Everyday Cryptography 1.5.310分鐘
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5分鐘
Everyday Cryptography 5.1.1 and 5.1.210分鐘
Cryptography Wars10分鐘
Quiz6 個練習
Why cryptography?2分鐘
The cryptographic toolkit2分鐘
Algorithms and keys2分鐘
Breaking cryptosystems2分鐘
Use of cryptography2分鐘
The cryptography dilemma2分鐘
3
完成時間(小時)
完成時間為 2 小時

Network and Computer Security

Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks....
Reading
10 個視頻 (總計 36 分鐘), 1 個閱讀材料, 9 個測驗
Video10 個視頻
Computer Networks and Information3分鐘
Network Security Protocols4分鐘
Threats3分鐘
Network Security Systems3分鐘
Kinds of data2分鐘
Authentication and Authorisation3分鐘
Access Control3分鐘
System Vulnerabilities3分鐘
System Security Tools3分鐘
Reading1 個閱讀材料
Information and Networks10分鐘
Quiz9 個練習
Threats and Information2分鐘
Networks6分鐘
Network Security Protocols4分鐘
Threats4分鐘
Network Security Systems4分鐘
Kinds of Data10分鐘
Authentication and Authorisation6分鐘
Access Control4分鐘
System Vulnerabilities2分鐘
4
完成時間(小時)
完成時間為 2 小時

Security Management

...
Reading
8 個視頻 (總計 27 分鐘), 3 個閱讀材料, 7 個測驗
Video8 個視頻
The ISO27000 Family4分鐘
Security Policies2分鐘
Security Controls3分鐘
The Risk Management Process3分鐘
Risk Assessment2分鐘
Regulations and legal frameworks3分鐘
Incident Management3分鐘
Reading3 個閱讀材料
Chapter: Introduction to Information Security and ISO2700110分鐘
Risk Management and Assessment10分鐘
Laws affecting Information Security10分鐘
Quiz7 個練習
ISO 2700112分鐘
Security Policies4分鐘
Security Controls4分鐘
Risk Management4分鐘
Risk Assessment4分鐘
Law and Regulations2分鐘
Incident Management4分鐘
4.5
113 個審閱Chevron Right
職業方向

30%

完成這些課程後已開始新的職業生涯
工作福利

83%

通過此課程獲得實實在在的工作福利

熱門審閱

創建者 JNMay 28th 2018

This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.

創建者 HRSep 13th 2017

The course is well explained. Can follow without any prior knowledge. Can be considered as a strong foundation for Information Security field. Highly recommended.

講師

Avatar

Professor Peter Komisarczuk

Programme Director
Information Security Group, Royal Holloway, University of London
Avatar

Professor Keith M. Martin

Professor of Information Security
Information Security Group, Royal Holloway, University of London
Avatar

Dr Jorge Blasco Alis

Lecturer in Information Security
Information Security Group, Royal Holloway, University of London

關於 University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

關於 Royal Holloway, University of London

Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law. ...

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您购买证书后,将有权访问所有课程材料,包括评分作业。完成课程后,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

還有其他問題嗎?請訪問 學生幫助中心