Introduction to Information Security Management
Offered By: University of Malaya via FutureLearn
Course Description
Overview
Dive into the concept of information security
Modern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, it’s essential that organisations protect it.
On this two-week course, you’ll explore the concept of information security management in protecting an organisation’s data from threats from both humans and nature alike.
Discover the CIA Triad and how it works
This course will guide you through three elements of information security, known as the CIA Triad, that make up the backbone of information security management. You’ll then look at how the CIA Triad works and protects data.
Explore possible IT vulnerabilities, attacks, and threats
A threat in the context of computer security is a potential negative action or event made possible by a vulnerability which can lead to an unintended effect on a computer system or application.
You’ll explore how a data breach happens, information security vulnerabilities, and the differences between attacks and threats. You’ll also learn how risk connects with vulnerability and threat.
This course is designed for IT students and those working in IT-related environments. It will also be of interest to anyone that handles data and would like to know more about information security.
Syllabus
- Introduction to Information security
- Getting Started
- What is information security
- Three requirements in information security
- Weekly wrap up
- Vulnerability, Threats and Attacks
- Definition of Data breach
- Vulnerabilities
- Differences between Threats and Attacks
- What is Risk?
- Weekly wrap up
Taught by
Norjihan Abdul Ghani
Tags
Related Courses
Information Security and Risk Management in ContextUniversity of Washington via Coursera Designing and Executing Information Security Strategies
University of Washington via Coursera Intro to Information Security
Georgia Institute of Technology via Udacity Information Security and Risk Management: An Overview
University of Washington via Canvas Network Information Security- II
Indian Institute of Technology Madras via Swayam