Duration
2 weeksWeekly study
5 hours100% online
How it works
Information Security Policy and Management
Discover the influence of policy, plan, and procedure on digital security
Information Security policies are designed to help individuals within an organisation practice behaviours which reduce the risk of a breach to digital security.
On this course, you’ll explore the key terms and critical concepts of information security, enabling you to successfully navigate and even create company data security policies at work.
Understand security policies
You’ll look at the reasons organisations create Information Security Policies, which may include detecting and forestalling the compromise of information security such as misuse of data, networks, computer systems, and applications
You’ll consider the five goals of security governance: * Strategic alignment * Risk management * Resource management * Performance measurement * Value delivery
You’ll also look at the Information Security Management System (ISMS), a systematic approach to managing sensitive company information so that it remains secure.
Discover access control
Study the key principles of access control, including control architecture models, password security issues, and biometrics (a way of identifying and authenticating individuals through the use of unique biological characteristics).
You’ll unpack contingency planning (CP), the process of positioning an organisation to prepare for, detect, react to, and recover from man-made or natural threats to information security assets.
Examine incident response strategies
Finally, you’ll explore incident response; the methodology an organisation uses to respond to and manage a cyber-attack.
You’ll look at the goals of an incident response strategy, the different stages and the various teams involved. You’ll conclude by considering how to develop an effective incident response planning policy.
What topics will you cover?
- Guiding principles of information security
- Developing pragmatic security policies and ensuring universal participation
- Implementing and maintaining information security within the enterprise
When would you like to start?
Start straight away and join a global classroom of learners. If the course hasn’t started yet you’ll see the future date listed below.
Available now
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Explain the role of a security policy and how it protects people, organisations, and information
- Evaluate the influence of policy on establishing acceptable bounds for behaviour
- Evaluate existing IT governance policies
- Explain self-direction in designing security policies to defend assets within the context of global communication and the web
Who is the course for?
This course is for anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them.
If you want to further your subject knowledge, you may be interested in these courses from the same provider. They share similar subject matter and the same overall learning outcomes:
Ways to learn | Buy this course | Subscribe & save | Limited access |
---|---|---|---|
Choose the best way to learn for you! | $109/one-off payment | $244.99 for a whole year Automatically renews | Free |
Fulfill your current learning need | Develop skills to further your career | Sample the course materials | |
Access to this course | tick | tick | Access expires 18 Oct 2024 |
Access to 1,000+ courses | cross | tick | cross |
Learn at your own pace | tick | tick | cross |
Discuss your learning in comments | tick | tick | tick |
Tests to check your learning | tick | tick | cross |
Certificate when you're eligible | Printed and digital | Digital only | cross |
Cancel for free anytime |
Ways to learn
Choose the best way to learn for you!
Subscribe & save
$244.99 for a whole year
Automatically renews
Develop skills to further your career
- Access to this course
- Access to 1,000+ courses
- Learn at your own pace
- Discuss your learning in comments
- Tests to boost your learning
- Digital certificate when you're eligible
Cancel for free anytime
Buy this course
$109/one-off payment
Fulfill your current learning need
- Access to this course
- Learn at your own pace
- Discuss your learning in comments
- Tests to boost your learning
- Printed and digital certificate when you’re eligible
Limited access
Free
Sample the course materials
- Access expires 18 Oct 2024
Find out more about certificates, Unlimited or buying a course (Upgrades) Sale price available until 31 October 2024 at 23:59 (UTC). T&Cs apply. |
Find out more about certificates, Unlimited or buying a course (Upgrades)
Sale price available until 31 October 2024 at 23:59 (UTC). T&Cs apply.
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn
Do you know someone who'd love this course? Tell them about it...
More courses you might like
Learners who joined this course have also enjoyed these courses.
Browse more in IT & Computer Science