Introduction to Information Security Management
Offered By: University of Malaya via FutureLearn
Course Description
Overview
Dive into the concept of information security
Modern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, it’s essential that organisations protect it.
On this two-week course, you’ll explore the concept of information security management in protecting an organisation’s data from threats from both humans and nature alike.
Discover the CIA Triad and how it works
This course will guide you through three elements of information security, known as the CIA Triad, that make up the backbone of information security management. You’ll then look at how the CIA Triad works and protects data.
Explore possible IT vulnerabilities, attacks, and threats
A threat in the context of computer security is a potential negative action or event made possible by a vulnerability which can lead to an unintended effect on a computer system or application.
You’ll explore how a data breach happens, information security vulnerabilities, and the differences between attacks and threats. You’ll also learn how risk connects with vulnerability and threat.
This course is designed for IT students and those working in IT-related environments. It will also be of interest to anyone that handles data and would like to know more about information security.
Syllabus
- Introduction to Information security
- Getting Started
- What is information security
- Three requirements in information security
- Weekly wrap up
- Vulnerability, Threats and Attacks
- Definition of Data breach
- Vulnerabilities
- Differences between Threats and Attacks
- What is Risk?
- Weekly wrap up
Taught by
Norjihan Abdul Ghani
Tags
Related Courses
Cyber Threats and Attack VectorsUniversity of Colorado System via Coursera Cybersecurity in Healthcare (Hospitals & Care Centres)
Erasmus University Rotterdam via Coursera Information Security Operations Center ISOC for Non-Techies
Udemy Cloud Data Security
University of Minnesota via Coursera Network Security Basics
Pluralsight