Introduction to Information Security Management
Posted 1 year 10 months ago by Universiti Malaya
Dive into the concept of information security
Modern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, it’s essential that organisations protect it.
On this two-week course, you’ll explore the concept of information security management in protecting an organisation’s data from threats from both humans and nature alike.
Discover the CIA Triad and how it works
This course will guide you through three elements of information security, known as the CIA Triad, that make up the backbone of information security management. You’ll then look at how the CIA Triad works and protects data.
Explore possible IT vulnerabilities, attacks, and threats
A threat in the context of computer security is a potential negative action or event made possible by a vulnerability which can lead to an unintended effect on a computer system or application.
You’ll explore how a data breach happens, information security vulnerabilities, and the differences between attacks and threats. You’ll also learn how risk connects with vulnerability and threat.
This course is designed for IT students and those working in IT-related environments. It will also be of interest to anyone that handles data and would like to know more about information security.
This course is designed for IT students and those working in IT-related environments. It will also be of interest to anyone that handles data and would like to know more about information security.
- Explain the concept of information security.
- Describe three requirements in information security.
- Identify possible vulnerabilities, attacks and threats involved in the information security.
- Describe activities required in information security risk management.
Universiti Malaya - Latest Courses
Next Generation Sequencing Technologies: Principles and Applications
- 2 weeks
- Online
Mainstreaming Genetic Testing For Cancer Treatment
- 6 weeks
- Online
Information Literacy: Skills for Researchers
- 5 weeks
- Online
Building Information Modelling (BIM) for Historic Buildings and Built Environment
- 2 weeks
- Online
Unlocking the Secrets of the Chinese Language
- 2 weeks
- Online