• University of Malaya logo

Introduction to Information Security Management

Build your fundamental knowledge of information security management and how it defends an organisation’s data from threats.

652 enrolled on this course

Data Security system Shield Protection Verification.

Introduction to Information Security Management

652 enrolled on this course

  • 2 weeks

  • 2 hours per week

  • Digital certificate when eligible

  • Introductory level

Find out more about how to join this course

  • Duration

    2 weeks
  • Weekly study

    2 hours
  • 100% online

    How it works
  • Unlimited subscription

    $244.99 for one whole yearLearn more

Dive into the concept of information security

Modern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, it’s essential that organisations protect it.

On this two-week course, you’ll explore the concept of information security management in protecting an organisation’s data from threats from both humans and nature alike.

Discover the CIA Triad and how it works

This course will guide you through three elements of information security, known as the CIA Triad, that make up the backbone of information security management. You’ll then look at how the CIA Triad works and protects data.

Explore possible IT vulnerabilities, attacks, and threats

A threat in the context of computer security is a potential negative action or event made possible by a vulnerability which can lead to an unintended effect on a computer system or application.

You’ll explore how a data breach happens, information security vulnerabilities, and the differences between attacks and threats. You’ll also learn how risk connects with vulnerability and threat.

Syllabus

  • Week 1

    Introduction to Information security

    • Getting Started

      This activity will introduce the instructor and course learning outcome for weeks one and two.

    • What is information security

      This activity introduces the meaning of information security and how it reflect to our daily life.

    • Three requirements in information security

      This activity discusses the three requirements of information security; confidentiality, integrity and availability.

    • Weekly wrap up

      Let's reflect on what we've covered this week and look at what's coming up next.

  • Week 2

    Vulnerability, Threats and Attacks

    • Definition of Data breach

      This activity introduces the definition of data breach.

    • Vulnerabilities

      This activity explains common types of vulnerabilities that occur in information security.

    • Differences between Threats and Attacks

      This activity explains threats and attacks exist in information security. Also explain the differences between threats and attacks.

    • What is Risk?

      This activity discusses several types of risks.

    • Weekly wrap up

      Congratulations on reaching the final activity. Let's reflect on what we've covered in week two.

When would you like to start?

Start straight away and join a global classroom of learners. If the course hasn’t started yet you’ll see the future date listed below.

  • Available now

Learning on this course

On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Explain the concept of information security.
  • Describe three requirements in information security.
  • Identify possible vulnerabilities, attacks and threats involved in the information security.
  • Describe activities required in information security risk management.

Who is the course for?

This course is designed for IT students and those working in IT-related environments. It will also be of interest to anyone that handles data and would like to know more about information security.

Who will you learn with?

I'm Dr Norjihan, currently an Associate Professor at Faculty of Computer Science & Information Technology, Universiti Malaya. My research and teaching areas are in information security and database.

Who developed the course?

Universiti Malaya

Universiti Malaya is the premier research university in Malaysia, committed to advancing knowledge and learning through quality research and education for the nation and for humanity.

  • Established

    1905
  • Location

    Kuala Lumpur, Malaysia
  • World ranking

    Top 60Source: QS World University Rankings 2021

Ways to learn

Buy this course

Subscribe & save

Limited access

Choose the best way to learn for you!

$109/one-off payment

$244.99 for one whole year

Automatically renews

Free

Fulfill your current learning needDevelop skills to further your careerSample the course materials
Access to this courseticktick

Access expires 2 Jun 2024

Access to 1,000+ coursescrosstickcross
Learn at your own paceticktickcross
Discuss your learning in commentstickticktick
Certificate when you're eligiblePrinted and digitalDigital onlycross
Continue & Upgrade

Cancel for free anytime

Ways to learn

Choose the best way to learn for you!

Subscribe & save

$244.99 for one whole year

Automatically renews

Develop skills to further your career

  • Access to this course
  • Access to 1,000+ courses
  • Learn at your own pace
  • Discuss your learning in comments
  • Digital certificate when you're eligible

Cancel for free anytime

Buy this course

$109/one-off payment

Fulfill your current learning need

  • Access to this course
  • Learn at your own pace
  • Discuss your learning in comments
  • Printed and digital certificate when you’re eligible

Limited access

Free

Sample the course materials

  • Access expires 2 Jun 2024

Find out more about certificates, Unlimited or buying a course (Upgrades)

Sale price available until 3 June 2024 at 23:59 (UTC). T&Cs apply.

Find out more about certificates, Unlimited or buying a course (Upgrades)

Sale price available until 3 June 2024 at 23:59 (UTC). T&Cs apply.

Learning on FutureLearn

Your learning, your rules

  • Courses are split into weeks, activities, and steps to help you keep track of your learning
  • Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
  • Stay motivated by using the Progress page to keep track of your step completion and assessment scores

Join a global classroom

  • Experience the power of social learning, and get inspired by an international network of learners
  • Share ideas with your peers and course educators on every step of the course
  • Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others

Map your progress

  • As you work through the course, use notifications and the Progress page to guide your learning
  • Whenever you’re ready, mark each step as complete, you’re in control
  • Complete 90% of course steps and all of the assessments to earn your certificate

Want to know more about learning on FutureLearn? Using FutureLearn

Do you know someone who'd love this course? Tell them about it...