Introduction to Information Security Management

Posted 1 year 10 months ago by Universiti Malaya

Study Method : Online
Duration : 2 weeks
Subject : IT & Computer Science
Overview
Build your fundamental knowledge of information security management and how it defends an organisation’s data from threats.
Course Description

Dive into the concept of information security

Modern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, it’s essential that organisations protect it.

On this two-week course, you’ll explore the concept of information security management in protecting an organisation’s data from threats from both humans and nature alike.

Discover the CIA Triad and how it works

This course will guide you through three elements of information security, known as the CIA Triad, that make up the backbone of information security management. You’ll then look at how the CIA Triad works and protects data.

Explore possible IT vulnerabilities, attacks, and threats

A threat in the context of computer security is a potential negative action or event made possible by a vulnerability which can lead to an unintended effect on a computer system or application.

You’ll explore how a data breach happens, information security vulnerabilities, and the differences between attacks and threats. You’ll also learn how risk connects with vulnerability and threat.

This course is designed for IT students and those working in IT-related environments. It will also be of interest to anyone that handles data and would like to know more about information security.

Requirements

This course is designed for IT students and those working in IT-related environments. It will also be of interest to anyone that handles data and would like to know more about information security.

Career Path
  • Explain the concept of information security.
  • Describe three requirements in information security.
  • Identify possible vulnerabilities, attacks and threats involved in the information security.
  • Describe activities required in information security risk management.