Informações sobre o curso
45,033 visualizações recentes

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 14 horas para completar

Sugerido: 7 hours/week...

Inglês

Legendas: Inglês, Vietnamita, Árabe

Habilidades que você terá

CybersecurityCryptographyInformation Security (INFOSEC)Security Management

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 14 horas para completar

Sugerido: 7 hours/week...

Inglês

Legendas: Inglês, Vietnamita, Árabe

Programa - O que você aprenderá com este curso

Semana
1
2 horas para concluir

Introduction to Information Security

4 vídeos (Total 17 mín.), 5 leituras, 4 testes
4 videos
The CIA Triad: Confidentiality Integrity and Availability2min
A brief Introduction to the RMIAS model5min
An introduction to knowledge areas in Information Security5min
5 leituras
An overview10min
Information Security - What's that?10min
It's not just IT10min
A more comprehensive security model10min
A brief introduction to cyber security knowledge areas10min
4 exercícios práticos
Information and security4min
Questions around the CIA Triad6min
Derived from the RMIAS8min
End of week test10min
Semana
2
3 horas para concluir

Introduction to Cryptography

8 vídeos (Total 45 mín.), 6 leituras, 6 testes
8 videos
This video reviews the physical world security services that we need to replicate in cyberspace.6min
This video introduces the core information security services and tools provided by cryptography.5min
This video explains some core cryptographic concepts and introduces two different types of cryptography.8min
This video discusses potential points of weakness in any system using cryptography.6min
This video discusses how different types of cryptography are used in `real-world' applications.7min
This video explains why control of cryptography presents society with a dilemma.8min
Summary56s
6 leituras
Everyday Cryptography 1.1.1 and 1.1.210min
Everyday Cryptography 1.310min
Everyday Cryptography 1.5.310min
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5min
Everyday Cryptography 5.1.1 and 5.1.210min
Cryptography Wars10min
6 exercícios práticos
Why cryptography?2min
The cryptographic toolkit2min
Algorithms and keys2min
Breaking cryptosystems2min
Use of cryptography2min
The cryptography dilemma2min
Semana
3
2 horas para concluir

Network and Computer Security

10 vídeos (Total 36 mín.), 1 leitura, 9 testes
10 videos
Computer Networks and Information3min
Network Security Protocols4min
Threats3min
Network Security Systems3min
Kinds of data2min
Authentication and Authorisation3min
Access Control3min
System Vulnerabilities3min
System Security Tools3min
1 leituras
Information and Networks10min
9 exercícios práticos
Threats and Information2min
Networks6min
Network Security Protocols4min
Threats4min
Network Security Systems4min
Kinds of Data10min
Authentication and Authorisation6min
Access Control4min
System Vulnerabilities2min
Semana
4
2 horas para concluir

Security Management

8 vídeos (Total 27 mín.), 3 leituras, 7 testes
8 videos
The ISO27000 Family4min
Security Policies2min
Security Controls3min
The Risk Management Process3min
Risk Assessment2min
Regulations and legal frameworks3min
Incident Management3min
3 leituras
Chapter: Introduction to Information Security and ISO2700110min
Risk Management and Assessment10min
Laws affecting Information Security10min
7 exercícios práticos
ISO 2700112min
Security Policies4min
Security Controls4min
Risk Management4min
Risk Assessment4min
Law and Regulations2min
Incident Management4min
4.6
158 avaliaçõesChevron Right

48%

comecei uma nova carreira após concluir estes cursos

39%

consegui um benefício significativo de carreira com este curso

Principais avaliações do Information Security: Context and Introduction

por JNMay 28th 2018

This has been very informative. I am in the IT industry and this has served as a good reminder and has helped me understand some rationales behind some of the things I do on a daily basis.

por JKJun 10th 2017

This course was a great introduction to information security. It was not so difficult but so easy to learn. it made me understand fundamental languages of this field.

Instrutores

Avatar

Professor Peter Komisarczuk

Programme Director
Information Security Group, Royal Holloway, University of London
Avatar

Professor Keith M. Martin

Professor of Information Security
Information Security Group, Royal Holloway, University of London
Avatar

Dr Jorge Blasco Alis

Lecturer in Information Security
Information Security Group, Royal Holloway, University of London

Sobre Universidade de Londres

The University of London is a federal University which includes 18 world leading Colleges. Our distance learning programmes were founded in 1858 and have enriched the lives of thousands of students, delivering high quality University of London degrees wherever our students are across the globe. Our alumni include 7 Nobel Prize winners. Today, we are a global leader in distance and flexible study, offering degree programmes to over 50,000 students in over 180 countries. To find out more about studying for one of our degrees where you are, visit www.london.ac.uk...

Sobre Royal Holloway, University of London

Royal Holloway, University of London, is ranked in the top 30 universities in the UK (Times & Sunday Times Good University Guide, 2018) and the top 200 universities in the world (Times Higher Education World University Rankings, 2017-18). The university was founded by two social reformers who pioneered the ideal of education and knowledge for all who could benefit. Their vision lives on today. As one of the UK’s leading research-intensive universities Royal Holloway is home to some of the world’s foremost authorities in the sciences, arts, business, economics and law. ...

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você adquire o Certificado, ganha acesso a todo o material do curso, incluindo avaliações com nota atribuída. Após concluir o curso, seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.