课程信息
4.5
408 个评分
113 个审阅
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
初级

初级

完成时间(小时)

完成时间大约为14 小时

建议:7 hours/week...
可选语言

英语(English)

字幕:英语(English), 越南语, 阿拉伯语(Arabic)

您将获得的技能

CybersecurityCryptographyInformation Security (INFOSEC)Security Management
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
初级

初级

完成时间(小时)

完成时间大约为14 小时

建议:7 hours/week...
可选语言

英语(English)

字幕:英语(English), 越南语, 阿拉伯语(Arabic)

教学大纲 - 您将从这门课程中学到什么

1
完成时间(小时)
完成时间为 2 小时

Introduction to Information Security

...
Reading
4 个视频 (总计 17 分钟), 5 个阅读材料, 4 个测验
Video4 个视频
The CIA Triad: Confidentiality Integrity and Availability2分钟
A brief Introduction to the RMIAS model5分钟
An introduction to knowledge areas in Information Security5分钟
Reading5 个阅读材料
An overview10分钟
Information Security - What's that?10分钟
It's not just IT10分钟
A more comprehensive security model10分钟
A brief introduction to cyber security knowledge areas10分钟
Quiz4 个练习
Information and security4分钟
Questions around the CIA Triad6分钟
Derived from the RMIAS8分钟
End of week test10分钟
2
完成时间(小时)
完成时间为 3 小时

Introduction to Cryptography

This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built....
Reading
8 个视频 (总计 45 分钟), 6 个阅读材料, 6 个测验
Video8 个视频
This video reviews the physical world security services that we need to replicate in cyberspace.6分钟
This video introduces the core information security services and tools provided by cryptography.5分钟
This video explains some core cryptographic concepts and introduces two different types of cryptography.8分钟
This video discusses potential points of weakness in any system using cryptography.6分钟
This video discusses how different types of cryptography are used in `real-world' applications.7分钟
This video explains why control of cryptography presents society with a dilemma.8分钟
Summary分钟
Reading6 个阅读材料
Everyday Cryptography 1.1.1 and 1.1.210分钟
Everyday Cryptography 1.310分钟
Everyday Cryptography 1.5.310分钟
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5分钟
Everyday Cryptography 5.1.1 and 5.1.210分钟
Cryptography Wars10分钟
Quiz6 个练习
Why cryptography?2分钟
The cryptographic toolkit2分钟
Algorithms and keys2分钟
Breaking cryptosystems2分钟
Use of cryptography2分钟
The cryptography dilemma2分钟
3
完成时间(小时)
完成时间为 2 小时

Network and Computer Security

Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks....
Reading
10 个视频 (总计 36 分钟), 1 个阅读材料, 9 个测验
Video10 个视频
Computer Networks and Information3分钟
Network Security Protocols4分钟
Threats3分钟
Network Security Systems3分钟
Kinds of data2分钟
Authentication and Authorisation3分钟
Access Control3分钟
System Vulnerabilities3分钟
System Security Tools3分钟
Reading1 个阅读材料
Information and Networks10分钟
Quiz9 个练习
Threats and Information2分钟
Networks6分钟
Network Security Protocols4分钟
Threats4分钟
Network Security Systems4分钟
Kinds of Data10分钟
Authentication and Authorisation6分钟
Access Control4分钟
System Vulnerabilities2分钟
4
完成时间(小时)
完成时间为 2 小时

Security Management

...
Reading
8 个视频 (总计 27 分钟), 3 个阅读材料, 7 个测验
Video8 个视频
The ISO27000 Family4分钟
Security Policies2分钟
Security Controls3分钟
The Risk Management Process3分钟
Risk Assessment2分钟
Regulations and legal frameworks3分钟
Incident Management3分钟
Reading3 个阅读材料
Chapter: Introduction to Information Security and ISO2700110分钟
Risk Management and Assessment10分钟
Laws affecting Information Security10分钟
Quiz7 个练习
ISO 2700112分钟
Security Policies4分钟
Security Controls4分钟
Risk Management4分钟
Risk Assessment4分钟
Law and Regulations2分钟
Incident Management4分钟
4.5
113 个审阅Chevron Right
职业方向

30%

完成这些课程后已开始新的职业生涯
工作福利

83%

通过此课程获得实实在在的工作福利

热门审阅

创建者 JNMay 28th 2018

This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.

创建者 HRSep 13th 2017

The course is well explained. Can follow without any prior knowledge. Can be considered as a strong foundation for Information Security field. Highly recommended.

讲师

Avatar

Professor Peter Komisarczuk

Programme Director
Information Security Group, Royal Holloway, University of London
Avatar

Professor Keith M. Martin

Professor of Information Security
Information Security Group, Royal Holloway, University of London
Avatar

Dr Jorge Blasco Alis

Lecturer in Information Security
Information Security Group, Royal Holloway, University of London

关于 University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

关于 Royal Holloway, University of London

Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law. ...

常见问题

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您购买证书后,将有权访问所有课程材料,包括评分作业。完成课程后,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

还有其他问题吗?请访问 学生帮助中心