Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Description

This course provides a one-semester overview of information security. It is designed to help students with
prior computer and programming knowledge — both undergraduate and graduate — understand this important
priority in society today. The technical content of the course gives a broad overview of essential concepts and
methods for providing and evaluating security in information processing systems (operating systems and
applications, networks, protocols, and so on).

In addition to its technical content, the course touches on the
importance of management and administration, the place information security holds in overall business risk,
social issues such as individual privacy, and the role of public policy.

Tags

Syllabus

  • Foundations
    • Security mindset,Essential concepts (policy, CIA, etc.)
  • Software security
    • Vulnerabilities and protections,Malware,Program analysis
  • Practical cryptography
    • Encryption,Authentication,Hashing,Symmetric and asymmetric crypto
  • Networks
    • Wired and wireless networks,Protocols,Attacks and countermeasures
  • Applications and special topics
    • Databases,Web apps,Privacy and anonymity,Voting,Public policy

Online Course


Intro to Information Security

Affiliate notice

This course provides a one-semester overview of information security. It is designed to help students with
prior computer and programming knowledge — both undergraduate and graduate — understand this important
priority in society today. The technical content of the course gives a broad overview of essential concepts and
methods for providing and evaluating security in information processing systems (operating systems and
applications, networks, protocols, and so on).

In addition to its technical content, the course touches on the
importance of management and administration, the place information security holds in overall business risk,
social issues such as individual privacy, and the role of public policy.

  • Foundations
    • Security mindset,Essential concepts (policy, CIA, etc.)
  • Software security
    • Vulnerabilities and protections,Malware,Program analysis
  • Practical cryptography
    • Encryption,Authentication,Hashing,Symmetric and asymmetric crypto
  • Networks
    • Wired and wireless networks,Protocols,Attacks and countermeasures
  • Applications and special topics
    • Databases,Web apps,Privacy and anonymity,Voting,Public policy