About this Course

209,659 recent views

Learner Career Outcomes

52%

started a new career after completing these courses

41%

got a tangible career benefit from this course
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 11 hours to complete
English
Subtitles: English, Vietnamese, Arabic

Skills you will gain

CybersecurityCryptographyInformation Security (INFOSEC)Security Management

Learner Career Outcomes

52%

started a new career after completing these courses

41%

got a tangible career benefit from this course
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 11 hours to complete
English
Subtitles: English, Vietnamese, Arabic

Offered by

University of London logo

University of London

Royal Holloway, University of London logo

Royal Holloway, University of London

Syllabus - What you will learn from this course

Content RatingThumbs Up94%(16,094 ratings)Info
Week
1

Week 1

2 hours to complete

Introduction to Information Security

2 hours to complete
4 videos (Total 17 min), 5 readings, 4 quizzes
4 videos
The CIA Triad: Confidentiality Integrity and Availability2m
A brief Introduction to the RMIAS model5m
An introduction to knowledge areas in Information Security5m
5 readings
An overview10m
Information Security - What's that?10m
It's not just IT10m
A more comprehensive security model10m
A brief introduction to cyber security knowledge areas10m
4 practice exercises
Information and security4m
Questions around the CIA Triad6m
Derived from the RMIAS8m
End of week test10m
Week
2

Week 2

3 hours to complete

Introduction to Cryptography

3 hours to complete
8 videos (Total 45 min), 6 readings, 6 quizzes
8 videos
This video reviews the physical world security services that we need to replicate in cyberspace.6m
This video introduces the core information security services and tools provided by cryptography.5m
This video explains some core cryptographic concepts and introduces two different types of cryptography.8m
This video discusses potential points of weakness in any system using cryptography.6m
This video discusses how different types of cryptography are used in `real-world' applications.7m
This video explains why control of cryptography presents society with a dilemma.8m
Summary56s
6 readings
Everyday Cryptography 1.1.1 and 1.1.210m
Everyday Cryptography 1.310m
Everyday Cryptography 1.5.310m
Will superfast ‘quantum’ computers mean the end of unbreakable encryption?5m
Everyday Cryptography 5.1.1 and 5.1.210m
Cryptography Wars10m
6 practice exercises
Why cryptography?2m
The cryptographic toolkit2m
Algorithms and keys2m
Breaking cryptosystems2m
Use of cryptography2m
The cryptography dilemma2m
Week
3

Week 3

2 hours to complete

Network and Computer Security

2 hours to complete
10 videos (Total 36 min), 1 reading, 9 quizzes
10 videos
Computer Networks and Information3m
Network Security Protocols4m
Threats3m
Network Security Systems3m
Kinds of data2m
Authentication and Authorisation3m
Access Control3m
System Vulnerabilities3m
System Security Tools3m
1 reading
Information and Networks10m
9 practice exercises
Threats and Information2m
Networks6m
Network Security Protocols4m
Threats4m
Network Security Systems4m
Kinds of Data10m
Authentication and Authorisation6m
Access Control4m
System Vulnerabilities2m
Week
4

Week 4

2 hours to complete

Security Management

2 hours to complete
8 videos (Total 27 min), 3 readings, 7 quizzes
8 videos
The ISO27000 Family4m
Security Policies2m
Security Controls3m
The Risk Management Process3m
Risk Assessment2m
Regulations and legal frameworks3m
Incident Management3m
3 readings
Chapter: Introduction to Information Security and ISO2700110m
Risk Management and Assessment10m
Laws affecting Information Security10m
7 practice exercises
ISO 2700112m
Security Policies4m
Security Controls4m
Risk Management4m
Risk Assessment4m
Law and Regulations2m
Incident Management4m

Reviews

TOP REVIEWS FROM INFORMATION SECURITY: CONTEXT AND INTRODUCTION

View all reviews

Frequently Asked Questions

  • Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:

    • The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.
    • The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • You will be eligible for a full refund until two weeks after your payment date, or (for courses that have just launched) until two weeks after the first session of the course begins, whichever is later. You cannot receive a refund once you’ve earned a Course Certificate, even if you complete the course within the two-week refund period. See our full refund policy.

  • Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You’ll be prompted to complete an application and will be notified if you are approved. Learn more.

More questions? Visit the Learner Help Center.