Informações sobre o curso
4.5
391 classificações
110 avaliações
100% online

100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 14 horas para completar

Sugerido: 7 hours/week...
Idiomas disponíveis

Inglês

Legendas: Inglês, Vietnamita, Árabe...

Habilidades que você terá

CybersecurityCryptographyInformation Security (INFOSEC)Security Management
100% online

100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 14 horas para completar

Sugerido: 7 hours/week...
Idiomas disponíveis

Inglês

Legendas: Inglês, Vietnamita, Árabe...

Programa - O que você aprenderá com este curso

Semana
1
Horas para completar
2 horas para concluir

Introduction to Information Security

...
Reading
4 vídeos (Total de 17 min), 5 leituras, 4 testes
Video4 videos
The CIA Triad: Confidentiality Integrity and Availability2min
A brief Introduction to the RMIAS model5min
An introduction to knowledge areas in Information Security5min
Reading5 leituras
An overview10min
Information Security - What's that?10min
It's not just IT10min
A more comprehensive security model10min
A brief introduction to cyber security knowledge areas10min
Quiz4 exercícios práticos
Information and security4min
Questions around the CIA Triad6min
Derived from the RMIAS8min
End of week test10min
Semana
2
Horas para completar
3 horas para concluir

Introduction to Cryptography

This module introduces cryptography, which provides a toolkit for implementing the core security services upon which all information security technologies are built....
Reading
8 vídeos (Total de 45 min), 6 leituras, 6 testes
Video8 videos
This video reviews the physical world security services that we need to replicate in cyberspace.6min
This video introduces the core information security services and tools provided by cryptography.5min
This video explains some core cryptographic concepts and introduces two different types of cryptography.8min
This video discusses potential points of weakness in any system using cryptography.6min
This video discusses how different types of cryptography are used in `real-world' applications.7min
This video explains why control of cryptography presents society with a dilemma.8min
Summarymin
Reading6 leituras
Everyday Cryptography 1.1.1 and 1.1.210min
Everyday Cryptography 1.310min
Everyday Cryptography 1.5.310min
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5min
Everyday Cryptography 5.1.1 and 5.1.210min
Cryptography Wars10min
Quiz6 exercícios práticos
Why cryptography?2min
The cryptographic toolkit2min
Algorithms and keys2min
Breaking cryptosystems2min
Use of cryptography2min
The cryptography dilemma2min
Semana
3
Horas para completar
2 horas para concluir

Network and Computer Security

Information being used by computers and being transmitted through a network is susceptible to many different threats. During this week's module, you will learn how the security of information can be put at risk and what we can do to mitigate these risks....
Reading
10 vídeos (Total de 36 min), 1 leitura, 9 testes
Video10 videos
Computer Networks and Information3min
Network Security Protocols4min
Threats3min
Network Security Systems3min
Kinds of data2min
Authentication and Authorisation3min
Access Control3min
System Vulnerabilities3min
System Security Tools3min
Reading1 leituras
Information and Networks10min
Quiz9 exercícios práticos
Threats and Information2min
Networks6min
Network Security Protocols4min
Threats4min
Network Security Systems4min
Kinds of Data10min
Authentication and Authorisation6min
Access Control4min
System Vulnerabilities2min
Semana
4
Horas para completar
2 horas para concluir

Security Management

...
Reading
8 vídeos (Total de 27 min), 3 leituras, 7 testes
Video8 videos
The ISO27000 Family4min
Security Policies2min
Security Controls3min
The Risk Management Process3min
Risk Assessment2min
Regulations and legal frameworks3min
Incident Management3min
Reading3 leituras
Chapter: Introduction to Information Security and ISO2700110min
Risk Management and Assessment10min
Laws affecting Information Security10min
Quiz7 exercícios práticos
ISO 2700112min
Security Policies4min
Security Controls4min
Risk Management4min
Risk Assessment4min
Law and Regulations2min
Incident Management4min
4.5
110 avaliaçõesChevron Right
Direcionamento de carreira

30%

comecei uma nova carreira após concluir estes cursos
Benefício de carreira

83%

consegui um benefício significativo de carreira com este curso

Melhores avaliações

por JNMay 28th 2018

This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.

por JKJun 10th 2017

This course was a great introduction to information security. It was not so difficult but so easy to learn. it made me understand fundamental languages of this field.

Instrutores

Avatar

Professor Peter Komisarczuk

Programme Director
Information Security Group, Royal Holloway, University of London
Avatar

Professor Keith M. Martin

Professor of Information Security
Information Security Group, Royal Holloway, University of London
Avatar

Dr Jorge Blasco Alis

Lecturer in Information Security
Information Security Group, Royal Holloway, University of London

Sobre University of London

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

Sobre Royal Holloway, University of London

Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law. ...

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você adquire o Certificado, ganha acesso a todo o material do curso, incluindo avaliações com nota atribuída. Após concluir o curso, seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.