Cyber Security Fundamentals (Coursera)

Cyber Security Fundamentals (Coursera)
Course Auditing
Categories
Effort
Certification
Languages
Good general knowledge of, and interest in, Information and Communications Technology
Misc

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cyber Security Fundamentals (Coursera)
This course is intended to provide a general introduction to key concepts in cyber security. It is aimed at anyone with a good general knowledge of information and communications technology. The nature, scope and importance of cyber security are explained, and key concepts are justified and explored. This includes examining the types of threat that cyber security must address, as well as the range of mechanisms, both technological and procedural, that can be deployed.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

The role of cryptography in providing security is explored, including how algorithms and keys play their part in enabling cyber security. The key supporting function played by key management is identified, including why the use of cryptographic functions depends on it.

The need for security management in an organisation is explained, and its main elements are introduced - including the key role played by risk management. The importance of standardised approaches to security management is explained, as is the notion of compliance.


Syllabus


WEEK 1

Cyber security basics

This module provides an introduction to cyber security. The scope of the subject is reviewed, and a definition is introduced based on the three key security objectives of confidentiality, integrity and availability.


WEEK 2

Cryptography – the basics

The importance of cryptography in providing cyber security is explained, and key elements of cryptography are introduced.


WEEK 3

Security management

In an organisational context, security management covers the design and implementation of all aspects of the information security management system (ISMS), that is, the set of policies, processes, and procedures established to provide cyber security. The role of the ISMS is introduced and key elements of its functioning explained.



MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Course Auditing
46.00 EUR
Good general knowledge of, and interest in, Information and Communications Technology

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.