The course "Information Security" aims to prepare you for a deeper understanding and application of information security principles and practices essential for today’s digital landscape. In this course, you’ll be introduced to the fundamental concepts of securing information systems, program security, database integrity, operating system protections, cloud security, and privacy frameworks. You’ll learn about various types of security threats, vulnerabilities, and defences, as well as the legal and ethical dimensions of cybersecurity. The course covers a wide variety of topics, from program-level safeguards to physical security and auditing practices. These topics are designed to give you an overview of critical areas within the field, serving as a foundation for further specialisation and research in your degree program. Whether you're interested in secure software design, cloud infrastructure security, or the evolving challenges in privacy and anonymity, this course offers a comprehensive starting point to build your expertise in cybersecurity.

Information Security

Recommended experience
Recommended experience
Intermediate level
Basic knowledge of computer systems, networking, and programming, along with familiarity with operating systems and databases, is recommended.
Recommended experience
Recommended experience
Intermediate level
Basic knowledge of computer systems, networking, and programming, along with familiarity with operating systems and databases, is recommended.
What you'll learn
Analyse various security threats, vulnerabilities, and corresponding mitigation techniques to protect information systems.
Design secure programs, databases, and operating systems by applying principles of secure software development and system protection.
Evaluate privacy, legal, and ethical considerations in implementing cybersecurity solutions across diverse environments.
Details to know

Add to your LinkedIn profile
April 2026
96 assignments
See how employees at top companies are mastering in-demand skills

There are 10 modules in this course
This module provides an overview of information security, covering its foundational concepts, evolution, key components, and importance in the digital age. It introduces the concepts of risks, vulnerabilities, threats, and the motivations of threat actors, laying the groundwork for understanding the modern cybersecurity landscape.
What's included
13 videos4 readings10 assignments
13 videos•Total 92 minutes
- Meet Your Instructor - Dr. Rajesh Kumar•1 minute
- Meet Your Instructor - Prof. Hemant Rathore•2 minutes
- Course Introductory Video•1 minute
- Foundations of Information Security - 1•9 minutes
- Foundations of Information Security - 2•14 minutes
- Foundations of Information Security - 3•9 minutes
- Threats, Vulnerabilities and Attacks•9 minutes
- Computer Malware•15 minutes
- Phishing Attack•8 minutes
- Ransomware Attacks•5 minutes
- DoS Attacks•4 minutes
- Information Security Framework and Standards•7 minutes
- Design Principles•7 minutes
4 readings•Total 110 minutes
- Course Overview •10 minutes
- Recommended Reading: Overview of Information Security•30 minutes
- Recommended Reading: Attacks and Vulnerability in Information Security•30 minutes
- Recommended Reading: Information Security Risk Management - Tools & Technique•40 minutes
10 assignments•Total 69 minutes
- Foundations of Information Security - 1•9 minutes
- Foundations of Information Security - 2•9 minutes
- Foundations of Information Security - 3•9 minutes
- Threats, Vulnerabilities and Attacks•6 minutes
- Computer Malware•6 minutes
- Phishing Attack•6 minutes
- Ransomware Attacks•6 minutes
- DoS Attacks•6 minutes
- Information Security Framework and Standards•6 minutes
- Design Principles•6 minutes
This module delves into security policies and access control, which are crucial for managing and restricting access to sensitive information. Learners will explore various types of access control mechanisms and how these are enforced through policy frameworks. The module also discusses confidentiality, integrity, and hybrid policies, giving a foundational understanding of how organisations safeguard data against unauthorised use.
What's included
7 videos3 readings8 assignments
7 videos•Total 76 minutes
- Introduction to Security Policies•9 minutes
- Mechanism Ensuring Security Policy•4 minutes
- Introduction to Access Control•11 minutes
- Access Control Mechanisms•11 minutes
- Confidentiality Policy•15 minutes
- Integrity Policies•17 minutes
- Hybrid Policies•8 minutes
3 readings•Total 140 minutes
- Recommended Reading: Security Policies•40 minutes
- Recommended Reading: Access Control•50 minutes
- Recommended Reading: Security Policy Frameworks•50 minutes
8 assignments•Total 138 minutes
- Graded Quiz for Week 1 and 2 •60 minutes
- Introduction to Security Policies •9 minutes
- Mechanism Ensuring Security Policy •9 minutes
- Introduction to Access Control •12 minutes
- Access Control Mechanisms •12 minutes
- Confidentiality Policy •12 minutes
- Integrity Policies •12 minutes
- Hybrid Policies •12 minutes
This module focuses on implementing security at different layers of the OSI model, from network to application. Learners will gain hands-on knowledge of security protocols such as IPSec, TLS/SSL, and secure application communication. The module also introduces real-world attack vectors and how to defend against them using layered security approaches.
What's included
12 videos3 readings12 assignments
12 videos•Total 89 minutes
- Network Layer Security•9 minutes
- IPSec and Security Associations•9 minutes
- IPSec Protocols and Encryption•8 minutes
- TLS / SSL Protocols•7 minutes
- SSL Handshake•6 minutes
- Authentication and Key Distribution•7 minutes
- Secure Remote Access•7 minutes
- Email Security•8 minutes
- Web Security - Setup•8 minutes
- Cookie Theft•6 minutes
- Attacks on Web Applications•9 minutes
- Cross Site Scripting•5 minutes
3 readings•Total 190 minutes
- Recommended Reading: Network Security•60 minutes
- Recommended Reading: Security at Transport Layer•50 minutes
- Recommended Reading: Security at Application Layer•80 minutes
12 assignments•Total 72 minutes
- Network Layer Security•6 minutes
- IPSec and Security Associations•6 minutes
- IPSec Protocols and Encryption•6 minutes
- TLS/ SSL Protocols•6 minutes
- SSL Handshake•6 minutes
- Authentication and Key Distribution•6 minutes
- Secure Remote Access•6 minutes
- Email Security•6 minutes
- Web Security - Setup•6 minutes
- Cookie Theft•6 minutes
- Attacks on Web Applications•6 minutes
- Cross Site Scripting•6 minutes
This module explores various network defenses and system-level protections, including intrusion detection/prevention systems, firewalls, and secure OS configurations. Learners will also explore secure software development practices, physical infrastructure security, and the role of human factors in cybersecurity.
What's included
13 videos4 readings14 assignments
13 videos•Total 102 minutes
- Intrusion Detection Systems - Fundamentals •7 minutes
- Types of Intrusion Detection System•9 minutes
- Intrusion Prevention System (IPS)•3 minutes
- Firewall Fundamentals•4 minutes
- Firewalls Configurations•4 minutes
- CPU Modes •8 minutes
- UNIX Access Control•10 minutes
- Operating System Security: Best Practices•7 minutes
- Secure Software Development •8 minutes
- Buffer Overflow•12 minutes
- Common Software Vulnerabilities and Best Practices•14 minutes
- Physical and Cyber Attacks•7 minutes
- Human Factors•10 minutes
4 readings•Total 240 minutes
- Recommended Reading: Network Defenses •60 minutes
- Recommended Reading: Securing Operating Systems•60 minutes
- Recommended Reading: Program Security•60 minutes
- Recommended Reading: Physical and Infrastructure Security•60 minutes
14 assignments•Total 177 minutes
- Graded Quiz for Week 3 and 4 •60 minutes
- Intrusion Detection Systems - Fundamentals •9 minutes
- Types of Intrusion Detection System•9 minutes
- Intrusion Prevention System (IPS)•9 minutes
- Firewall Fundamentals•9 minutes
- Firewall Configurations•9 minutes
- CPU Modes •9 minutes
- UNIX Access Control•9 minutes
- Operating System Security: Best Practices•9 minutes
- Secure Software Development •9 minutes
- Buffer Overflow•9 minutes
- Common Software Vulnerabilities and Best Practices•9 minutes
- Physical and Cyber Attacks•9 minutes
- Human Factors•9 minutes
This module introduces learners to threat modelling techniques and frameworks such as attack trees and the cyber kill chain. It also covers attack classification databases (CAPEC, CVE, CVSS), incident response procedures, and the legal and ethical dimensions of cybersecurity. The module culminates in a staff-graded assessment for applied learning.
What's included
10 videos4 readings10 assignments
10 videos•Total 81 minutes
- Threat Modelling Basics •11 minutes
- Cyber Kill Chain•5 minutes
- Attack Tree•11 minutes
- CAPEC •5 minutes
- CVE•9 minutes
- CVSS•14 minutes
- CVSS Scoring - An Example•3 minutes
- Incident Response Technologies•9 minutes
- Ethical Dilemma•7 minutes
- Legal Frameworks in Information Security•7 minutes
4 readings•Total 300 minutes
- Recommended Reading: Threat Modelling Frameworks•90 minutes
- Recommended Reading: Attack Databases•90 minutes
- Recommended Reading: Incident Response•60 minutes
- Recommended Reading: Legal and Ethical Aspects•60 minutes
10 assignments•Total 90 minutes
- Threat Modelling Basics •9 minutes
- Cyber Kill Chain•9 minutes
- Attack Tree•9 minutes
- CAPEC •9 minutes
- CVE (Common Vulnerabilities and Exposures)•9 minutes
- CVSS (Common Vulnerability Scoring System)•9 minutes
- CVSS Scoring - An Example•9 minutes
- Incident Response Technologies•9 minutes
- Ethical Dilemma•9 minutes
- Legal Frameworks in Information Security•9 minutes
This module provides a foundational understanding of information security, its key components, and the evolution of encryption techniques. It introduces the classical encryption techniques like substitution and Caesar ciphers, and the mathematical foundations behind these methods.
What's included
8 videos8 readings9 assignments
8 videos•Total 80 minutes
- CIA Triad•12 minutes
- Model for Network Security•12 minutes
- Types of Network Attacks•9 minutes
- Kerckhoff Principle and Substitution Cipher•11 minutes
- Caesar Cipher•9 minutes
- Attacks and Limitations of Historical Ciphers•10 minutes
- Introduction to Modular Arithmetic•12 minutes
- Ring in Modular Arithmetic•5 minutes
8 readings•Total 115 minutes
- Essential Reading: CIA Triad•15 minutes
- Recommended Reading: Model for Network Security•15 minutes
- Recommended Reading: Types of Network Attacks•15 minutes
- Essential Reading: Kerckhoff Principle and Substitution Cipher•15 minutes
- Recommended Reading: Caesar Cipher•15 minutes
- Recommended Reading: Attacks and Limitations of Historical Ciphers•15 minutes
- Essential Reading: Introduction to Modular Arithmetic•15 minutes
- Recommended Reading: Ring in Modular Arithmetic•10 minutes
9 assignments•Total 150 minutes
- Graded Quiz for Week 5 and 6•60 minutes
- CIA Triad•6 minutes
- Model for Network Security•12 minutes
- Types of Network Attacks•12 minutes
- Kerckhoff Principle and Substitution Cipher•12 minutes
- Caesar Cipher•6 minutes
- Attacks and Limitations of Historical Ciphers•12 minutes
- Introduction to Modular Arithmetic•15 minutes
- Ring in Modular Arithmetic•15 minutes
This module introduces encryption fundamentals, focusing on public and private key cryptographic techniques. It explores the differences between symmetric and asymmetric encryption, the working mechanisms of stream and block ciphers, and their practical applications in modern security.
What's included
7 videos7 readings7 assignments
7 videos•Total 76 minutes
- Overview of Symmetric and Asymmetric Cryptography •12 minutes
- Stream Cipher (Part-1)•10 minutes
- Stream Cipher (Part-2) •6 minutes
- Stream Cipher (Part-3) •11 minutes
- Random Number Generators (RNGs)•10 minutes
- RC4 (Rivest Cipher 4)•15 minutes
- RC4 (Example)•12 minutes
7 readings•Total 102 minutes
- Essential Reading: Overview of Symmetric and Asymmetric Cryptography•15 minutes
- Essential Reading: Stream Cipher (Part-1)•15 minutes
- Recommended Reading: Stream Cipher (Part-2)•10 minutes
- Recommended Reading: Stream Cipher (Part-3) •15 minutes
- Recommended Reading: Random Number Generators (RNGs)•15 minutes
- Essential Reading: RC4 (Rivest Cipher 4)•17 minutes
- Recommended Reading: RC4 Example•15 minutes
7 assignments•Total 90 minutes
- Overview of Symmetric and Asymmetric Cryptography•30 minutes
- Stream Cipher (Part-1)•12 minutes
- Stream Cipher (Part-2) •3 minutes
- Stream Cipher (Part-3) •6 minutes
- Random Number Generators (RNGs)•9 minutes
- RC4 (Rivest Cipher 4)•18 minutes
- RC4 Example•12 minutes
This module delves into asymmetric encryption techniques. It covers RSA and Diffie-Hellman algorithms, block cipher modes of operation, and challenges in modern cryptography, including quantum threats. Learners will explore how these techniques are applied in real-world systems and examine the trade-offs between security, performance, and scalability.
What's included
12 videos12 readings13 assignments
12 videos•Total 119 minutes
- Basics of Block Cipher•11 minutes
- AES (Part-1)•11 minutes
- AES (Part-2)•4 minutes
- AES (Part-3)•9 minutes
- AES (Part-4)•7 minutes
- AES (Part-5)•16 minutes
- Block Cipher Modes (Part-1) •11 minutes
- Block Cipher Modes (Part-2)•10 minutes
- Block Cipher Modes (Part-3)•14 minutes
- Brute Force Attack•7 minutes
- Double Encryption•12 minutes
- Triple Encryption•9 minutes
12 readings•Total 165 minutes
- Essential Reading: Basics of Block Cipher•15 minutes
- Recommended Reading: AES (Part-1)•15 minutes
- Recommended Reading: AES (Part-2)•10 minutes
- Recommended Reading: AES (Part-3)•15 minutes
- Recommended Reading: AES (Part-4)•15 minutes
- Recommended Reading: AES (Part-5)•15 minutes
- Essential Reading: Block Cipher Modes (Part-1)•15 minutes
- Recommended Reading: Block Cipher Modes (Part-2)•15 minutes
- Recommended Reading: Block Cipher Modes (Part-3)•15 minutes
- Essential Reading: Brute Force Attack•10 minutes
- Recommended Reading: Double Encryption•15 minutes
- Recommended Reading: Triple Encryption•10 minutes
13 assignments•Total 150 minutes
- Graded Quiz for Week 7 and 8•60 minutes
- Basics of Block Cipher•6 minutes
- AES (Part-1)•6 minutes
- AES (Part-2)•6 minutes
- AES (Part-3)•6 minutes
- AES (Part-4)•3 minutes
- AES (Part-5)•3 minutes
- Block Cipher Modes (Part-1)•9 minutes
- Block Cipher Modes (Part-2)•6 minutes
- Block Cipher Modes (Part-3)•15 minutes
- Brute Force Attack•6 minutes
- Double Encryption•12 minutes
- Triple Encryption•12 minutes
This module introduces asymmetric cryptography, focusing on the RSA algorithm and key establishment techniques such as Diffie-Hellman Key Exchange (DHKE). It highlights how asymmetric methods ensure data confidentiality and support secure communication.
What's included
6 videos6 readings6 assignments
6 videos•Total 85 minutes
- Introduction to Asymmetric Cryptosystem•14 minutes
- RSA Algorithm•16 minutes
- RSA Example•16 minutes
- Introduction•16 minutes
- DHKE (Part-1)•10 minutes
- DHKE (Part-2)•13 minutes
6 readings•Total 90 minutes
- Essential Reading: Introduction to Asymmetric Cryptosystem•15 minutes
- Recommended Reading: RSA Algorithm•15 minutes
- Recommended Reading: RSA Example•15 minutes
- Essential Reading: Introduction•15 minutes
- Recommended Reading: DHKE (Part-1)•15 minutes
- Recommended Reading: DHKE (Part-2)•15 minutes
6 assignments•Total 60 minutes
- Introduction to Asymmetric Cryptosystem•12 minutes
- RSA Algorithm•12 minutes
- RSA Example•6 minutes
- Introduction•9 minutes
- DHKE (Part-1)•9 minutes
- DHKE (Part-2)•12 minutes
This module covers the concepts of data integrity and authentication, focusing on hash functions and Message Authentication Codes (MACs). It explains how these cryptographic tools are used to verify the integrity and authenticity of information.
What's included
6 videos7 readings7 assignments
6 videos•Total 80 minutes
- Introduction to Hash Functions•13 minutes
- Hash Functions•15 minutes
- Different Hash Functions •11 minutes
- Message Authentication Code (Part-1)•15 minutes
- Message Authentication Code (Part-2)•15 minutes
- Message Authentication Code (Part-3)•10 minutes
7 readings•Total 95 minutes
- Essential Reading: Introduction to Hash Functions•15 minutes
- Recommended Reading: Hash Functions•15 minutes
- Recommended Reading: Different Hash Functions •10 minutes
- Essential Reading: Message Authentication Code (Part-1)•15 minutes
- Recommended Reading: Message Authentication Code (Part-2)•15 minutes
- Recommended Reading: Message Authentication Code (Part-3)•15 minutes
- Course Summary•10 minutes
7 assignments•Total 120 minutes
- Graded Quiz for Week 9 and 10•60 minutes
- Introduction to Hash Functions•6 minutes
- Hash Functions•12 minutes
- Different Hash Functions •12 minutes
- Message Authentication Code (Part-1)•18 minutes
- Message Authentication Code (Part-2)•6 minutes
- Message Authentication Code (Part-3)•6 minutes
Build toward a degree
This course is part of the following degree program(s) offered by Birla Institute of Technology & Science, Pilani. If you are admitted and enroll, your completed coursework may count toward your degree learning and your progress can transfer with you.¹
Build toward a degree
This course is part of the following degree program(s) offered by Birla Institute of Technology & Science, Pilani. If you are admitted and enroll, your completed coursework may count toward your degree learning and your progress can transfer with you.¹
Birla Institute of Technology & Science, Pilani
Bachelor of Science in Computer Science
Degree · 3-6 years
¹Successful application and enrollment are required. Eligibility requirements apply. Each institution determines the number of credits recognized by completing this content that may count towards degree requirements, considering any existing credits you may have. Click on a specific course for more information.
Instructor

Offered by

Offered by

Birla Institute of Technology & Science, Pilani (BITS Pilani) is one of only ten private universities in India to be recognised as an Institute of Eminence by the Ministry of Human Resource Development, Government of India. It has been consistently ranked high by both governmental and private ranking agencies for its innovative processes and capabilities that have enabled it to impart quality education and emerge as the best private science and engineering institute in India. BITS Pilani has four international campuses in Pilani, Goa, Hyderabad, and Dubai, and has been offering bachelor's, master’s, and certificate programmes for over 58 years, helping to launch the careers for over 1,00,000 professionals.
Explore more from Security
EEC-Council
Course
Status: Free TrialFree TrialCategory: Credit offeredCredit offered
Course
Status: Free TrialFree TrialCategory: Credit offeredCredit offered
PPackt
Course
Category: Credit offeredCredit offered
LLearnKartS
Course
Status: Free TrialFree TrialCategory: Credit offeredCredit offered
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
More questions
Financial aid available,