Overview
This course is intended to provide a general introduction to key concepts in cyber security. It is aimed at anyone with a good general knowledge of information and communications technology. The nature, scope and importance of cyber security are explained, and key concepts are justified and explored. This includes examining the types of threat that cyber security must address, as well as the range of mechanisms, both technological and procedural, that can be deployed.
The role of cryptography in providing security is explored, including how algorithms and keys play their part in enabling cyber security. The key supporting function played by key management is identified, including why the use of cryptographic functions depends on it.
The need for security management in an organisation is explained, and its main elements are introduced - including the key role played by risk management. The importance of standardised approaches to security management is explained, as is the notion of compliance.
Syllabus
- Cyber security basics
- This module provides an introduction to cyber security. The scope of the subject is reviewed, and a definition is introduced based on the three key security objectives of confidentiality, integrity and availability.
- Cryptography – the basics
- The importance of cryptography in providing cyber security is explained, and key elements of cryptography are introduced.
- Security management
- In an organisational context, security management covers the design and implementation of all aspects of the information security management system (ISMS), that is, the set of policies, processes, and procedures established to provide cyber security. The role of the ISMS is introduced and key elements of its functioning explained.
Taught by
Chris Mitchell
Tags
Reviews
5.0 rating, based on 1 Class Central review
4.7 rating at Coursera based on 173 ratings
Showing Class Central Sort
-
The course covers basics of Cyber security. The course can be taken by anyone who wants to learn about Cyber security concepts without having any prior knowledge of security.