This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Interest in information security has been spurred by the pervasive use of computer-based applications such as information systems, databases, and the Internet. Information security has also emerged as a national goal in the United States and in other countries with national defense and homeland security implications. Information security is enabled through securing data, computers, and networks. In this course, we will look into such topics as fundamentals of information security, computer security technology and principles, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment. By the end of this course, you will be able to describe major information security issues and trends, and advise an individual seeking to protect his or her data.
Upon successful completion of this course, the student will be able to
explain the challenges and scope of information security;
explain such basic security concepts as confidentiality, integrity, and availability, which are used frequently in the field of information security;
explain the importance of cryptographic algorithms used in information security in the context of the overall information technology (IT) industry;
identify and explain symmetric algorithms for encryption-based security of information;
identify and explain public-key based asymmetric algorithms for encryption-based security of information;
describe the access control mechanism used for user authentication and authorization;
describe Secure Sockets Layer (SSL) as a common solution enabling security of many applications, including all Internet-based commerce;
describe securing Internet Protocol (IP) communications by using Internet Protocol Security (IPSec);
explain the importance of physical security and discuss ways to improve physical security of an enterprise;
explain the use of such security tools as firewalls and intrusion prevention systems;
explain malicious software issues such as those introduced by software-based viruses and worms;
explain common software security issues such as buffer overflow; and
describe the basic process of risk assessment in the context of overall IT security management.
More info: http://www.saylor.org/courses/cs406/