Explore the guiding principles of information security policies and their influence on businesses and organisations.

TBC
  • Duration

    2 weeks
  • Weekly study

    5 hours
  • 100% online

    How it works
  • Included in an ExpertTrack

    Course 3 of 5
  • Get full ExpertTrack access

    $39/monthFind out more

Discover the influence of policy, plan and procedure on digital security

Information Security policies are designed to help individuals within an organisation practice behaviours which reduce the risk of a breach to digital security.

On this course, you’ll explore the key terms and critical concepts of information security, enabling you to successfully navigate and even create company data security policies at work.

Understand security policies

You’ll look at the reasons organisations create Information Security Policies, which may include detecting and forestalling the compromise of information security such as misuse of data, networks, computer systems, and applications

You’ll consider the five goals of security governance: * Strategic alignment * Risk management * Resource management * Performance measurement * Value delivery

You’ll also look at the Information Security Management System (ISMS), a systematic approach to managing sensitive company information so that it remains secure.

Discover access control

Study the key principles of access control, including control architecture models, password security issues, and biometrics (a way of identifying and authenticating individuals through the use of unique biological characteristics).

You’ll unpack contingency planning (CP), the process of positioning an organisation to prepare for, detect, react to, and recover from man-made or natural threats to information security assets.

Examine incident response strategies

Finally, you’ll explore incident response; the methodology an organisation uses to respond to and manage a cyber-attack.

You’ll look at the goals of an incident response strategy, the different stages and the various teams involved. You’ll conclude by considering how to develop an effective incident response planning policy.

Syllabus

  • Week 1

    Information Security Planning and Governance

    • Information Security Policy (ISP)

      Welcome to Week 1 of this course on digital security policy and management.

    • Information System Governance (ISG)

      Governance refers to a set of responsibilities and practices exercised by the board and executive management.

    • Information Security Management Systems (ISMS)

      An ISMS is a systematic approach to managing sensitive company information so that it remains secure.

    • Access control

      Access control is a technique by which systems determine if and how to allow a user into a trusted area of the organisation.

    • Summary and reflection

      Reflect on what you have learned and see what's coming up next.

  • Week 2

    Contingency Planning and Incident Response

    • What is contingency planning?

      Contingency planning (CP) is a process of positioning an organisation to prepare for, detect, react to and recover from man-made or natural threats to information security assets.

    • Contingency planning

      Contingency planning is achieved by exploring the differences among its various components and examining the role of each that comes into play.

    • Incident response

      Incident response is the methodology an organisation uses to respond to and manage a cyber-attack.

    • Summary and reflection

      Reflect on what you have learned and see what's coming up next.

Prove you're job ready

Highlight the new, job-relevant skills you’ve gained and supplement existing qualifications with a hard-earned, industry-specific digital certificate – plus one for every course within your ExpertTrack.

  • Learn the latest in your chosen industry or subject.
  • Complete each course and pass assessments.
  • Receive certificates validated by the educating organisation.
  • Impress employers with learning outcomes you can add to your CV.
  • Make your career dreams a reality.

Download a PDF

Learning on this course

On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Explain the role of a security policy and how it protects people, organisations, and information
  • Evaluate the influence of policy on establishing acceptable bounds for behaviour
  • Evaluate existing IT governance policies
  • Explain self-direction in designing security policies to defend assets within the context of global communication and the web

Who is the course for?

This course is for anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them.

Who developed the course?

Coventry University

Coventry secured 5 QS Stars for Teaching and Online Learning in the QS World University Ranking 2020 and has received No. 1 in the world for Massive Open Online Courses in MoocLab’s World University Ranking 2021.

  • Established

    1992
  • Location

    Coventry

About this ExpertTrack

Explore how to protect against cyber attacks using the key principles of digital security.

Start learning today - free 2-day trial

After your free trial you can:

  • Pay $39 per month to keep learning online
  • Have complete control over your subscription; you can cancel any time
  • Work at your own pace and set your own deadlines at every stage
  • Only pay while you’re learning; the subscription will cancel automatically when you finish
  • Complete online assessments to test your knowledge and prove your skills
  • Earn digital course certificates and a final award that you can share online, with potential employers, and your professional network
  • Keep access to the content of courses you complete even after your subscription ends

Learning on FutureLearn

Your learning, your rules

  • Courses are split into weeks, activities, and steps to help you keep track of your learning
  • Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
  • Stay motivated by using the Progress page to keep track of your step completion and assessment scores

Join a global classroom

  • Experience the power of social learning, and get inspired by an international network of learners
  • Share ideas with your peers and course educators on every step of the course
  • Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others

Map your progress

  • As you work through the course, use notifications and the Progress page to guide your learning
  • Whenever you’re ready, mark each step as complete, you’re in control
  • Complete 90% of course steps and all of the assessments to earn your certificate

Want to know more about learning on FutureLearn? Using FutureLearn

Do you know someone who'd love this course? Tell them about it...