Skip to content
Generic filters
Exact matches only

Information Security: Context and Introduction (Coursera)

In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts.

The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.

After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. You will be able to explain some of the key aspects of information risk and security management, in addition, summarise some of the key aspects in computer and network security, including some appreciation of threats, attacks, exploits and vulnerabilities. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry.



Introduction to Information Security

Graded: End of week test


Introduction to Cryptography

This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built.

Graded: Why cryptography?

Graded: The cryptographic toolkit

Graded: Algorithms and keys

Graded: Breaking cryptosystems

Graded: Use of cryptography

Graded: The cryptography dilemma


Network and Computer Security

Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week’s module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks.

Graded: Networks

Graded: Network Security Protocols

Graded: Threats

Graded: Network Security Systems

Graded: Authentication and Authorisation

Graded: Access Control

Graded: System Vulnerabilities


Security Management

Graded: ISO 27001

Graded: Security Policies

Graded: Security Controls

Graded: Risk Management

Graded: Law and Regulations

Graded: Incident Management


The Cyber Security Industry and Careers

This last week presents a model of the information security industry as an introduction and then goes on to consider skills, roles, careers and finally professional bodies in our industry.

Graded: Review questions

Graded: Professional and ethical considerations