Back

Information Security Basics

HomeMicro-CredentialsInformation Security Basics

Information Security Basics

$ 499
  • Program Type: Micro-credentials
Micro-Credential

The Information Security Basics micro-credential is designed to provide students with a solid foundation in the principles and practices of information security. Protecting sensitive data and systems from cyber threats has become increasingly critical as the digital landscape evolves. This course covers a wide range of topics, from the CIA triad and basic cryptography to risk management and security awareness, equipping students with the knowledge and skills required to safeguard digital assets effectively.

There are several compelling reasons why students should consider enrolling in the Information Security Basics micro-credential:
  1. Comprehensive understanding of information security: The course offers a broad overview of key information security concepts and practices, providing students with a well-rounded knowledge base that can be applied in various professional settings.
  2. Building a foundation: The skills acquired in this course will serve as a foundation for students looking to specialize in information security, such as network security, cryptography, or risk management.
  3. Enhancing organizational security: By understanding the principles and practices of information security, students will be better equipped to identify and address potential vulnerabilities, helping their organizations mitigate risks and prevent security incidents.
  4. Promoting a security-aware culture: The course emphasizes the importance of security awareness and training programs in reducing human-related security risks. As professionals, students can contribute to developing and implementing such programs, fostering a securityconscious culture within their organizations.
Module 1: Introduction to Information Security
    • Definition, importance, and role of information security in the digital world
Module 2:  Confidentiality, Integrity, and Availability (CIA) Triad
    • Core principles of information security and their significance
Module 3: Common Security Threats
    • Overview of prevalent security threats: malware, phishing, ransomware, DDoS attacks
Module 4: Basic Cryptography
    • Introduction to cryptography concepts: symmetric and asymmetric encryption, digital signatures, hash functions
Module 5: Authentication and Authorization
    • Verifying user identities and controlling access to resources
    • Multi-factor authentication and role-based access control
Module 6: Physical Security
    • Importance of physical security measures: access controls, surveillance, secure disposal of sensitive information
Module 7:  Network Security
    • Network security concepts: firewalls, intrusion detection/prevention systems, secure communication protocols
Module 8: Social Engineering
    • Social engineering attacks: phishing, pretexting
    • Recognizing and preventing social engineering attacks
Module 9: Security Policies and Procedures
    • Creating and implementing security policies, procedures, and guidelines in an organization
Module 10: Risk Management
    • Risk assessment, risk mitigation, and risk management framework importance
Module 11: Incident Response and Disaster Recovery
    • Incident response process, disaster recovery planning, business continuity management
Module 12: Security Awareness and Training
    • Significance of security awareness and training programs in reducing human-related security risks