Digital Security Training: Cyber Threats and Risk Management
Offered By: Coventry University via FutureLearn
Course Description
Overview
Understand digital security and protect against cyber threats
Explore how to protect against cyber attacks using the key principles of digital security.
Explore how to protect against cyber attacks using the key principles of digital security.
Syllabus
Courses under this program:
Course 1: The Cyber Security Landscape
-Understand cyber security, types of cyber threat, and the development of an effective security policy.
Course 2: Risk Management and Security Vulnerabilities
-Learn the fundamentals of IT risk management and the techniques used to mitigate threats to an organisation and its people.
Course 3: Information Security Policy and Management
-Explore the guiding principles of information security policies and their influence on businesses and organisations.
Course 4: Cryptography and Digital Certificates
-Understand cryptographic concepts and explore cyber laws and the legal implications of globalised data and access.
Course 5: The Future of Cyber Security and Emerging Technologies
-Discuss the future of cyber security, emerging technologies, the challenges they pose and the development of cyber solutions.
Course 1: The Cyber Security Landscape
-Understand cyber security, types of cyber threat, and the development of an effective security policy.
Course 2: Risk Management and Security Vulnerabilities
-Learn the fundamentals of IT risk management and the techniques used to mitigate threats to an organisation and its people.
Course 3: Information Security Policy and Management
-Explore the guiding principles of information security policies and their influence on businesses and organisations.
Course 4: Cryptography and Digital Certificates
-Understand cryptographic concepts and explore cyber laws and the legal implications of globalised data and access.
Course 5: The Future of Cyber Security and Emerging Technologies
-Discuss the future of cyber security, emerging technologies, the challenges they pose and the development of cyber solutions.
Tags
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera