Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coventry University

Information Security Policy and Management

Coventry University via FutureLearn

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!

Discover the influence of policy, plan, and procedure on digital security

Information Security policies are designed to help individuals within an organisation practice behaviours which reduce the risk of a breach to digital security.

On this course, you’ll explore the key terms and critical concepts of information security, enabling you to successfully navigate and even create company data security policies at work.

Understand security policies

You’ll look at the reasons organisations create Information Security Policies, which may include detecting and forestalling the compromise of information security such as misuse of data, networks, computer systems, and applications

You’ll consider the five goals of security governance: * Strategic alignment * Risk management * Resource management * Performance measurement * Value delivery

You’ll also look at the Information Security Management System (ISMS), a systematic approach to managing sensitive company information so that it remains secure.

Discover access control

Study the key principles of access control, including control architecture models, password security issues, and biometrics (a way of identifying and authenticating individuals through the use of unique biological characteristics).

You’ll unpack contingency planning (CP), the process of positioning an organisation to prepare for, detect, react to, and recover from man-made or natural threats to information security assets.

Examine incident response strategies

Finally, you’ll explore incident response; the methodology an organisation uses to respond to and manage a cyber-attack.

You’ll look at the goals of an incident response strategy, the different stages and the various teams involved. You’ll conclude by considering how to develop an effective incident response planning policy.

This course is for anyone who is keen to increase their knowledge of digital security risks and the tools and techniques used to guard against them.

If you want to further your subject knowledge, you may be interested in these courses from the same provider. They share similar subject matter and the same overall learning outcomes:

  • The Cyber Security Landscape
  • Risk Management and Security Vulnerabilities
  • Cryptography and Digital Certificates
  • The Future of Cyber Security and Emerging Technologies

Syllabus

  • Information Security Planning and Governance
    • Information Security Policy (ISP)
    • Information System Governance (ISG)
    • Information Security Management Systems (ISMS)
    • Access control
    • Summary and reflection
  • Contingency Planning and Incident Response
    • What is contingency planning?
    • Contingency planning
    • Incident response
    • Summary and reflection

Taught by

Chris Whitley

Reviews

Start your review of Information Security Policy and Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.