Introduction to Information Security
In this course you will learn about Information security from its various aspects.
This course is online MOOC (Massive Open Online Course) course so you can complete it according to your own schedule.
Perustiedot
- Hakuaika: 1.-14.1.2024
- Ajoitus: 22.1.-25.3.2024
- Laajuus: 3 cr
- Sijainti: Online
- Hinta: 0 €
This course is suitable for any student who is willing to learn the overview of information security technologies. The course is introductory level. Before joining this course, Student should have the basic knowledge in ICT environment and data networks. In addition, python and linux skills are beneficial.
The course provides preparatory training for Comptia Security+ but not certification exam. Learning material is based on Comptia Security+ SY0-501 certification training material. Course book (Comptia Security+ 7th Edition, Dulaney Emmett). The book is available for all students as an ebook in Laurea library.
Course content
Course consists of 6 knowledge areas and 10 modules
Threats, Attacks and Vulnerabilities
- Module-1: Malware
- Module-2: Attack Types
- Module-3: Threat Actors, Penetration Testing, Vulnerability Scanning and Vulnerability Types
Technologies and Tools
- Module-4: Security Components
- Module-5: Security Software, Common Security Issues, Analyzing Security Output, Securing Mobile Devices and Secure Protocols
Architecture and Design
- Module-6: Security Frameworks, Securing the Network, Secure Systems Design, Secure Deployments and Embedded Systems
- Module-7: Secure Application Development, Cloud Technologies, Resiliency and Automation and Physical Security Controls
Identity and Access Management
- Module-8: Identity and Access Management, Identity and Access Services, Identity and Access Controls and Account Management
Risk Management
- Module-9: Security Policies, Business Impact Analysis, Risk Management, Incident Response, Forensics, Disaster Recovery, Security Controls and Data Security and Privacy
Cryptography and PKI
- Module-10: Cryptography, Cryptography Algorithms, Wireless Security and Public Key Infrastructure
In addition, you'll go through how to complete the course during the orientation module and you'll have the possibility to give feedback after the course.
After completing the course you’re able to
- recognize and comprehend the importance of confidentiality, integrity and availability model for the information and cybersecurity
- recognize and comprehend different threats, attacks and vulnerabilities
- comprehend and describe security technologies and tools
- comprehend and describe security architectures and designs
- comprehend and describe identity and access management approaches
- comprehend, describe, and apply risk management principles
- comprehend and describe cryptography and PKI concepts
- differentiate cybersecurity domains and subdomains from each other
- comprehend and explain the importance of the cybersecurity in the modern society
Teaching methods
This course is online MOOC (Massive Open Online Course) course so you can complete it according to your own schedule.
- Virtual self-pace studies
- Weekly individual assignments and online discussions
A detailed schedule will be released in the beginning of the course. Optional online tutoring via Teams.
Course material
All the material and links can be found from Canvas workspace.
Evaluation
The course is graded with scale 1-5. Student needs to complete all the course modules to pass the course:
- Module learning material
- Module discussions
- Module quizzes
- Additional tasks & material