Information Security Basics
Information Security Basics
$
499
-
Program Type: Micro-credentials
Micro-Credential
-
PROGRAM DESCRIPTION
The Information Security Basics micro-credential is designed to provide students with a solid foundation in the principles and practices of information security. Protecting sensitive data and systems from cyber threats has become increasingly critical as the digital landscape evolves. This course covers a wide range of topics, from the CIA triad and basic cryptography to risk management and security awareness, equipping students with the knowledge and skills required to safeguard digital assets effectively.

-
IMPORTANCE
There are several compelling reasons why students should consider enrolling in the Information
Security Basics micro-credential:
- Comprehensive understanding of information security: The course offers a broad overview of key information security concepts and practices, providing students with a well-rounded knowledge base that can be applied in various professional settings.
- Building a foundation: The skills acquired in this course will serve as a foundation for students looking to specialize in information security, such as network security, cryptography, or risk management.
- Enhancing organizational security: By understanding the principles and practices of information security, students will be better equipped to identify and address potential vulnerabilities, helping their organizations mitigate risks and prevent security incidents.
- Promoting a security-aware culture: The course emphasizes the importance of security awareness and training programs in reducing human-related security risks. As professionals, students can contribute to developing and implementing such programs, fostering a securityconscious culture within their organizations.
- Curriculum
Module 1: Introduction to Information Security
-
- Definition, importance, and role of information security in the digital world
-
- Core principles of information security and their significance
-
- Overview of prevalent security threats: malware, phishing, ransomware, DDoS attacks
-
- Introduction to cryptography concepts: symmetric and asymmetric encryption, digital signatures, hash functions
-
- Verifying user identities and controlling access to resources
- Multi-factor authentication and role-based access control
-
- Importance of physical security measures: access controls, surveillance, secure disposal of sensitive information
-
- Network security concepts: firewalls, intrusion detection/prevention systems, secure communication protocols
-
- Social engineering attacks: phishing, pretexting
- Recognizing and preventing social engineering attacks
-
- Creating and implementing security policies, procedures, and guidelines in an organization
-
- Risk assessment, risk mitigation, and risk management framework importance
-
- Incident response process, disaster recovery planning, business continuity management
-
- Significance of security awareness and training programs in reducing human-related security risks