Coursera
探索
  • 浏览
  • 搜索
  • 企业版
  • 登录
  • 注册

Information Security: Context and Introduction

总览授课大纲常见问题解答制作方评分和审阅

主页计算机科学计算机安全和网络

Information Security: Context and Introduction

伦敦大学, Royal Holloway, University of London

关于此课程: In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals. After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry.


制作方:  伦敦大学, Royal Holloway, University of London
伦敦大学Royal Holloway, University of London

  • Professor Peter Komisarczuk

    教学方:  Professor Peter Komisarczuk, Programme Director

    Information Security Group, Royal Holloway, University of London

  • Professor Keith M. Martin

    教学方:  Professor Keith M. Martin, Professor of Information Security

    Information Security Group, Royal Holloway, University of London

  • Dr Jorge Blasco Alis

    教学方:  Dr Jorge Blasco Alis, Lecturer in Information Security

    Information Security Group, Royal Holloway, University of London
级别Beginner
语言
English, 字幕: Vietnamese
如何通过通过所有计分作业以完成课程。
用户评分
4.5 星
平均用户评分 4.5查看学生的留言
授课大纲
第 1 周
Introduction to Information Security
4 视频, 5 阅读材料, 3 练习测试
  1. Reading: An overview
  2. Discussion Prompt: What are you hoping to achieve in this course?
  3. 视频: What is Information Security?
  4. Reading: Information Security - What's that?
  5. Practice Quiz: Information and security
  6. 视频: The CIA Triad: Confidentiality Integrity and Availability
  7. Reading: It's not just IT
  8. Practice Quiz: Questions around the CIA Triad
  9. 视频: A brief Introduction to the RMIAS model
  10. Reading: A more comprehensive security model
  11. Practice Quiz: Derived from the RMIAS
  12. 视频: An introduction to knowledge areas in Information Security
  13. Reading: A brief introduction to cyber security knowledge areas
  14. Discussion Prompt: What Knowledge Areas?
已评分: End of week test
第 2 周
Introduction to Cryptography
This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built.
8 视频, 6 阅读材料
  1. 视频: Introduction
  2. Discussion Prompt: A non-digital environment
  3. 视频: This video reviews the physical world security services that we need to replicate in cyberspace.
  4. Reading: Everyday Cryptography 1.1.1 and 1.1.2
  5. 视频: This video introduces the core information security services and tools provided by cryptography.
  6. Reading: Everyday Cryptography 1.3
  7. Discussion Prompt: Security services
  8. 视频: This video explains some core cryptographic concepts and introduces two different types of cryptography.
  9. Reading: Everyday Cryptography 1.5.3
  10. Discussion Prompt: Kerckhoffs’ principles
  11. 视频: This video discusses potential points of weakness in any system using cryptography.
  12. Reading: Will superfast ‘quantum’ computers mean the end of unbreakable encryption?
  13. Discussion Prompt: Key management
  14. Reading: Everyday Cryptography 5.1.1 and 5.1.2
  15. 视频: This video discusses how different types of cryptography are used in `real-world' applications.
  16. Discussion Prompt: SSL/TLS
  17. Reading: Cryptography Wars
  18. 视频: This video explains why control of cryptography presents society with a dilemma.
  19. Discussion Prompt: The cryptography dilemma
  20. 视频: Summary
已评分: Why cryptography?
已评分: The cryptographic toolkit
已评分: Algorithms and keys
已评分: Breaking cryptosystems
已评分: Use of cryptography
已评分: The cryptography dilemma
第 3 周
Network and Computer Security
Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks.
10 视频, 1 阅读材料, 2 练习测试
  1. Practice Quiz: Threats and Information
  2. 视频: Introduction
  3. 视频: Computer Networks and Information
  4. Reading: Information and Networks
  5. 视频: Network Security Protocols
  6. Discussion Prompt: Other Network Security Protocols
  7. 视频: Threats
  8. 视频: Network Security Systems
  9. Discussion Prompt: Threats and Network Security Solutions
  10. 视频: Kinds of data
  11. Practice Quiz: Kinds of Data
  12. 视频: Authentication and Authorisation
  13. Discussion Prompt: Authentication Factors
  14. 视频: Access Control
  15. 视频: System Vulnerabilities
  16. 视频: System Security Tools
  17. Discussion Prompt: Security Tools
已评分: Networks
已评分: Network Security Protocols
已评分: Threats
已评分: Network Security Systems
已评分: Authentication and Authorisation
已评分: Access Control
已评分: System Vulnerabilities
第 4 周
Security Management
8 视频, 3 阅读材料, 1 练习测试
  1. 视频: Why Security Management?
  2. Discussion Prompt: Why Security Management?
  3. 视频: The ISO27000 Family
  4. Reading: Chapter: Introduction to Information Security and ISO27001
  5. Discussion Prompt: Other Information Security Management Frameworks
  6. 视频: Security Policies
  7. 视频: Security Controls
  8. 视频: The Risk Management Process
  9. 视频: Risk Assessment
  10. Practice Quiz: Risk Assessment
  11. Reading: Risk Management and Assessment
  12. 视频: Regulations and legal frameworks
  13. Discussion Prompt: National Regulations
  14. Reading: Laws affecting Information Security
  15. 视频: Incident Management
已评分: ISO 27001
已评分: Security Policies
已评分: Security Controls
已评分: Risk Management
已评分: Law and Regulations
已评分: Incident Management
第 5 周
The Cyber Security Industry and Careers
This last week presents a model of the information security industry as an introduction and then goes on to consider skills, roles, careers and finally professional bodies in our industry.
8 视频, 10 阅读材料, 1 练习测试
  1. Reading: A brief review
  2. Discussion Prompt: What, in your opinion, is the most interesting aspect of Information Security?
  3. Reading: briefing for week 5
  4. Reading: Introduction
  5. 视频: Building the information security industry model
  6. Reading: Basic elements in our model
  7. 视频: The Producers
  8. Reading: More about producers and products
  9. 视频: The Consumers
  10. Reading: More about the consumers
  11. 视频: The enforcers and the adversaries
  12. Reading: Wrapping up the model
  13. Practice Quiz: The information security industry model
  14. 视频: Introduction: roles and careers
  15. Reading: Careers in information Security
  16. 视频: Exploring roles and careers using the Inspired Careers website
  17. 视频: Introducing SFIA
  18. Reading: Skills Framework for the Information Age (SFIA)
  19. Discussion Prompt: What are the skills/roles that interest you most?
  20. 视频: Professional bodies in the context of Information Security
  21. Reading: A brief overview of professional bodies in the information security industry
  22. Discussion Prompt: Security related professional bodies around the world
  23. Discussion Prompt: Your information security career
已评分: Review questions
已评分: Professional and ethical considerations

常见问题解答
运作方式
Coursework
Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from Your Peers
Help from Your Peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates
Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

制作方
伦敦大学
The University of London is a federal University which includes 18 world leading Colleges. Our International Programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, search for 'London International'.
Royal Holloway, University of London
Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law.
评分和审阅
已评分 4.5,总共 5 个 291 评分

AK

great course

CW

Provides a basic knowledge of Information Security in general, and also understand each role (such as Digital Forensics, Penetration Testing, etc...)

PRAKHAR PRAKASH

Learn from the best

dv

i got basic concepts related to information security and cyber security which will help me further in my studies.



您可能也喜欢
University of Colorado System
Cybersecurity Policy for Aviation and Internet Infrastructures
1 门课程
University of Colorado System
Cybersecurity Policy for Aviation and Internet Infrastructures
查看课程
University of Colorado System
Cybersecurity Policy for Water and Electricity Infrastructures
1 门课程
University of Colorado System
Cybersecurity Policy for Water and Electricity Infrastructures
查看课程
University of Colorado System
Homeland Security and Cybersecurity Future
1 门课程
University of Colorado System
Homeland Security and Cybersecurity Future
查看课程
University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
1 门课程
University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
查看课程
University of Colorado System
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
1 门课程
University of Colorado System
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
查看课程
Coursera
Coursera 致力于普及全世界最好的教育,它与全球一流大学和机构合作提供在线课程。
© 2018 Coursera Inc. 保留所有权利。
通过 App Store 下载通过 Google Play 获取
  • Coursera
  • 关于
  • 管理团队
  • 工作机会
  • 目录
  • 证书
  • 学位
  • 商务
  • 政府版
  • 社区
  • 合作伙伴
  • 社区助教
  • 专业译员
  • 开发者
  • Beta 测试人员
  • 连接
  • 博客
  • Facebook
  • 领英
  • Twitter
  • Google+
  • 技术博客
  • 更多
  • 条款
  • 隐私
  • 帮助
  • 内容访问
  • 媒体
  • 联系我们
  • 目录
  • 附属公司