课程信息
4.5
344 ratings
102 reviews
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals. After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry....
Globe

100% 在线课程

立即开始,按照自己的计划学习。
Calendar

可灵活调整截止日期

根据您的日程表重置截止日期。
Beginner Level

初级

Clock

建议:6 hours/week

完成时间大约为13 小时
Comment Dots

English

字幕:English, Vietnamese

您将获得的技能

Information SecurityCryptographyCybersecuritySecurity Management
Globe

100% 在线课程

立即开始,按照自己的计划学习。
Calendar

可灵活调整截止日期

根据您的日程表重置截止日期。
Beginner Level

初级

Clock

建议:6 hours/week

完成时间大约为13 小时
Comment Dots

English

字幕:English, Vietnamese

教学大纲 - 您将从这门课程中学到什么

1

章节
Clock
完成时间为 2 小时

Introduction to Information Security

...
Reading
4 个视频(共 17 分钟), 5 个阅读材料, 4 个测验
Video4 个视频
The CIA Triad: Confidentiality Integrity and Availability2分钟
A brief Introduction to the RMIAS model5分钟
An introduction to knowledge areas in Information Security5分钟
Reading5 个阅读材料
An overview10分钟
Information Security - What's that?10分钟
It's not just IT10分钟
A more comprehensive security model10分钟
A brief introduction to cyber security knowledge areas10分钟
Quiz4 个练习
Information and security4分钟
Questions around the CIA Triad6分钟
Derived from the RMIAS8分钟
End of week test10分钟

2

章节
Clock
完成时间为 3 小时

Introduction to Cryptography

This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built....
Reading
8 个视频(共 45 分钟), 6 个阅读材料, 6 个测验
Video8 个视频
This video reviews the physical world security services that we need to replicate in cyberspace.6分钟
This video introduces the core information security services and tools provided by cryptography.5分钟
This video explains some core cryptographic concepts and introduces two different types of cryptography.8分钟
This video discusses potential points of weakness in any system using cryptography.6分钟
This video discusses how different types of cryptography are used in `real-world' applications.7分钟
This video explains why control of cryptography presents society with a dilemma.8分钟
Summary分钟
Reading6 个阅读材料
Everyday Cryptography 1.1.1 and 1.1.210分钟
Everyday Cryptography 1.310分钟
Everyday Cryptography 1.5.310分钟
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5分钟
Everyday Cryptography 5.1.1 and 5.1.210分钟
Cryptography Wars10分钟
Quiz6 个练习
Why cryptography?2分钟
The cryptographic toolkit2分钟
Algorithms and keys2分钟
Breaking cryptosystems2分钟
Use of cryptography2分钟
The cryptography dilemma2分钟

3

章节
Clock
完成时间为 2 小时

Network and Computer Security

Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks....
Reading
10 个视频(共 36 分钟), 1 个阅读材料, 9 个测验
Video10 个视频
Computer Networks and Information3分钟
Network Security Protocols4分钟
Threats3分钟
Network Security Systems3分钟
Kinds of data2分钟
Authentication and Authorisation3分钟
Access Control3分钟
System Vulnerabilities3分钟
System Security Tools3分钟
Reading1 个阅读材料
Information and Networks10分钟
Quiz9 个练习
Threats and Information2分钟
Networks6分钟
Network Security Protocols4分钟
Threats4分钟
Network Security Systems4分钟
Kinds of Data10分钟
Authentication and Authorisation6分钟
Access Control4分钟
System Vulnerabilities2分钟

4

章节
Clock
完成时间为 2 小时

Security Management

...
Reading
8 个视频(共 27 分钟), 3 个阅读材料, 7 个测验
Video8 个视频
The ISO27000 Family4分钟
Security Policies2分钟
Security Controls3分钟
The Risk Management Process3分钟
Risk Assessment2分钟
Regulations and legal frameworks3分钟
Incident Management3分钟
Reading3 个阅读材料
Chapter: Introduction to Information Security and ISO2700110分钟
Risk Management and Assessment10分钟
Laws affecting Information Security10分钟
Quiz7 个练习
ISO 2700112分钟
Security Policies4分钟
Security Controls4分钟
Risk Management4分钟
Risk Assessment4分钟
Law and Regulations2分钟
Incident Management4分钟
4.5
Direction Signs

30%

完成这些课程后已开始新的职业生涯
Briefcase

83%

通过此课程获得实实在在的工作福利

热门审阅

创建者 JNMay 28th 2018

This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.

创建者 HRSep 13th 2017

The course is well explained. Can follow without any prior knowledge. Can be considered as a strong foundation for Information Security field. Highly recommended.

讲师

Professor Peter Komisarczuk

Programme Director
Information Security Group, Royal Holloway, University of London

Professor Keith M. Martin

Professor of Information Security
Information Security Group, Royal Holloway, University of London

Dr Jorge Blasco Alis

Lecturer in Information Security
Information Security Group, Royal Holloway, University of London

关于 University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

关于 Royal Holloway, University of London

Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law. ...

常见问题

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

还有其他问题吗?请访问 学生帮助中心