Duration
2 weeksWeekly study
2 hours100% online
How it works
Introduction to Information Security Management
Dive into the concept of information security
Modern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, it’s essential that organisations protect it.
On this two-week course, you’ll explore the concept of information security management in protecting an organisation’s data from threats from both humans and nature alike.
Discover the CIA Triad and how it works
This course will guide you through three elements of information security, known as the CIA Triad, that make up the backbone of information security management. You’ll then look at how the CIA Triad works and protects data.
Explore possible IT vulnerabilities, attacks, and threats
A threat in the context of computer security is a potential negative action or event made possible by a vulnerability which can lead to an unintended effect on a computer system or application.
You’ll explore how a data breach happens, information security vulnerabilities, and the differences between attacks and threats. You’ll also learn how risk connects with vulnerability and threat.
Syllabus
Week 1
Introduction to Information security
Getting Started
This activity will introduce the instructor and course learning outcome for weeks one and two.
What is information security
This activity introduces the meaning of information security and how it reflect to our daily life.
Three requirements in information security
This activity discusses the three requirements of information security; confidentiality, integrity and availability.
Weekly wrap up
Let's reflect on what we've covered this week and look at what's coming up next.
Week 2
Vulnerability, Threats and Attacks
Definition of Data breach
This activity introduces the definition of data breach.
Vulnerabilities
This activity explains common types of vulnerabilities that occur in information security.
Differences between Threats and Attacks
This activity explains threats and attacks exist in information security. Also explain the differences between threats and attacks.
What is Risk?
This activity discusses several types of risks.
Weekly wrap up
Congratulations on reaching the final activity. Let's reflect on what we've covered in week two.
When would you like to start?
Start straight away and join a global classroom of learners. If the course hasn’t started yet you’ll see the future date listed below.
Available now
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Explain the concept of information security.
- Describe three requirements in information security.
- Identify possible vulnerabilities, attacks and threats involved in the information security.
- Describe activities required in information security risk management.
Who is the course for?
This course is designed for IT students and those working in IT-related environments. It will also be of interest to anyone that handles data and would like to know more about information security.
Who will you learn with?
I'm Dr Norjihan, currently an Associate Professor at Faculty of Computer Science & Information Technology, Universiti Malaya. My research and teaching areas are in information security and database.
Who developed the course?
Established
1905Location
Kuala Lumpur, MalaysiaWorld ranking
Top 60Source: QS World University Rankings 2021
Ways to learn | Subscribe & save | Buy this course | Limited access |
---|---|---|---|
Choose the best way to learn for you! | $349.99 for one year Automatically renews | $54/one-off payment | Free |
Develop skills to further your career | Fulfill your current learning need | Sample the course materials | |
Access to this course | tick | tick | Access expires 25 Nov 2024 |
Access to 1,000+ courses | tick | cross | cross |
Learn at your own pace | tick | tick | cross |
Discuss your learning in comments | tick | tick | tick |
Certificate when you're eligible | Digital only | Printed and digital | cross |
Cancel for free anytime |
Ways to learn
Choose the best way to learn for you!
Buy this course
$54/one-off payment
Fulfill your current learning need
- Access to this course
- Learn at your own pace
- Discuss your learning in comments
- Printed and digital certificate when you’re eligible
Subscribe & save
$349.99 for one year
Automatically renews
Develop skills to further your career
- Access to this course
- Access to 1,000+ courses
- Learn at your own pace
- Discuss your learning in comments
- Digital certificate when you're eligible
Cancel for free anytime
Limited access
Free
Sample the course materials
- Access expires 25 Nov 2024
Find out more about certificates, Unlimited or buying a course (Upgrades) |
Find out more about certificates, Unlimited or buying a course (Upgrades)
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn
Do you know someone who'd love this course? Tell them about it...
More courses you might like
Learners who joined this course have also enjoyed these courses.
Browse more in IT & Computer Science