About this Course
최근 조회 30,776

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 마감일

일정에 따라 마감일을 재설정합니다.

초급 단계

완료하는 데 약 14시간 필요

권장: 7 hours/week...

영어

자막: 영어, 베트남어, 아랍어

귀하가 습득할 기술

CybersecurityCryptographyInformation Security (INFOSEC)Security Management

100% 온라인

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 마감일

일정에 따라 마감일을 재설정합니다.

초급 단계

완료하는 데 약 14시간 필요

권장: 7 hours/week...

영어

자막: 영어, 베트남어, 아랍어

강의 계획 - 이 강좌에서 배울 내용

1
완료하는 데 2시간 필요

Introduction to Information Security

...
4 videos (Total 17 min), 5 readings, 4 quizzes
4개의 동영상
The CIA Triad: Confidentiality Integrity and Availability2m
A brief Introduction to the RMIAS model5m
An introduction to knowledge areas in Information Security5m
5개의 읽기 자료
An overview10m
Information Security - What's that?10m
It's not just IT10m
A more comprehensive security model10m
A brief introduction to cyber security knowledge areas10m
4개 연습문제
Information and security4m
Questions around the CIA Triad6m
Derived from the RMIAS8m
End of week test10m
2
완료하는 데 3시간 필요

Introduction to Cryptography

This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built.

...
8 videos (Total 45 min), 6 readings, 6 quizzes
8개의 동영상
This video reviews the physical world security services that we need to replicate in cyberspace.6m
This video introduces the core information security services and tools provided by cryptography.5m
This video explains some core cryptographic concepts and introduces two different types of cryptography.8m
This video discusses potential points of weakness in any system using cryptography.6m
This video discusses how different types of cryptography are used in `real-world' applications.7m
This video explains why control of cryptography presents society with a dilemma.8m
Summary56
6개의 읽기 자료
Everyday Cryptography 1.1.1 and 1.1.210m
Everyday Cryptography 1.310m
Everyday Cryptography 1.5.310m
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5m
Everyday Cryptography 5.1.1 and 5.1.210m
Cryptography Wars10m
6개 연습문제
Why cryptography?2m
The cryptographic toolkit2m
Algorithms and keys2m
Breaking cryptosystems2m
Use of cryptography2m
The cryptography dilemma2m
3
완료하는 데 2시간 필요

Network and Computer Security

Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks.

...
10 videos (Total 36 min), 1 reading, 9 quizzes
10개의 동영상
Computer Networks and Information3m
Network Security Protocols4m
Threats3m
Network Security Systems3m
Kinds of data2m
Authentication and Authorisation3m
Access Control3m
System Vulnerabilities3m
System Security Tools3m
1개의 읽기 자료
Information and Networks10m
9개 연습문제
Threats and Information2m
Networks6m
Network Security Protocols4m
Threats4m
Network Security Systems4m
Kinds of Data10m
Authentication and Authorisation6m
Access Control4m
System Vulnerabilities2m
4
완료하는 데 2시간 필요

Security Management

...
8 videos (Total 27 min), 3 readings, 7 quizzes
8개의 동영상
The ISO27000 Family4m
Security Policies2m
Security Controls3m
The Risk Management Process3m
Risk Assessment2m
Regulations and legal frameworks3m
Incident Management3m
3개의 읽기 자료
Chapter: Introduction to Information Security and ISO2700110m
Risk Management and Assessment10m
Laws affecting Information Security10m
7개 연습문제
ISO 2700112m
Security Policies4m
Security Controls4m
Risk Management4m
Risk Assessment4m
Law and Regulations2m
Incident Management4m
4.6
137개의 리뷰Chevron Right

43%

이 강좌를 수료한 후 새로운 경력 시작하기

34%

이 강좌를 통해 확실한 경력상 이점 얻기

Information Security: Context and Introduction의 최상위 리뷰

대학: JNMay 28th 2018

This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.

대학: HRSep 13th 2017

The course is well explained. Can follow without any prior knowledge. Can be considered as a strong foundation for Information Security field. Highly recommended.

강사

Avatar

Professor Peter Komisarczuk

Programme Director
Information Security Group, Royal Holloway, University of London
Avatar

Professor Keith M. Martin

Professor of Information Security
Information Security Group, Royal Holloway, University of London
Avatar

Dr Jorge Blasco Alis

Lecturer in Information Security
Information Security Group, Royal Holloway, University of London

런던 대학교 정보

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

로열 홀러웨이 대학교 정보

Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law. ...

자주 묻는 질문

  • 강좌에 등록하면 바로 모든 비디오, 테스트 및 프로그래밍 과제(해당하는 경우)에 접근할 수 있습니다. 상호 첨삭 과제는 이 세션이 시작된 경우에만 제출하고 검토할 수 있습니다. 강좌를 구매하지 않고 살펴보기만 하면 특정 과제에 접근하지 못할 수 있습니다.

  • 수료증을 구매하면 성적 평가 과제를 포함한 모든 강좌 자료에 접근할 수 있습니다. 강좌를 완료하면 전자 수료증이 성취도 페이지에 추가되며, 해당 페이지에서 수료증을 인쇄하거나 LinkedIn 프로필에 수료증을 추가할 수 있습니다. 강좌 콘텐츠만 읽고 살펴보려면 해당 강좌를 무료로 청강할 수 있습니다.

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.