Birla Institute of Technology & Science, Pilani

Information Security

Birla Institute of Technology & Science, Pilani

Information Security

Rajesh Kumar
Prof. Hemant Rathore

位教师:Rajesh Kumar

访问权限由 Coursera Learning Team 提供

深入了解一个主题并学习基础知识。
中级 等级

推荐体验

8 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
中级 等级

推荐体验

8 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Analyse various security threats, vulnerabilities, and corresponding mitigation techniques to protect information systems.

  • Design secure programs, databases, and operating systems by applying principles of secure software development and system protection.

  • Evaluate privacy, legal, and ethical considerations in implementing cybersecurity solutions across diverse environments.

要了解的详细信息

可分享的证书

添加到您的领英档案

作业

99 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有12个模块

In this module, the learners will be introduced to the course and its syllabus, setting the foundation for their learning journey. The course's introductory video will provide them with insights into the valuable skills and knowledge they can expect to gain throughout the duration of this course. Additionally, the syllabus reading will comprehensively outline essential course components, including course values, assessment criteria, grading system, schedule, details of live sessions, and a recommended reading list that will enhance the learner’s understanding of the course concepts. Moreover, this module offers the learners the opportunity to connect with fellow learners as they participate in a discussion prompt designed to facilitate introductions and exchanges within the course community.

涵盖的内容

3个视频1篇阅读材料1个讨论话题

This module provides an overview of information security, covering its foundational concepts, evolution, key components, and importance in the digital age. It introduces the concepts of risks, vulnerabilities, threats, and the motivations of threat actors, laying the groundwork for understanding the modern cybersecurity landscape.

涵盖的内容

11个视频3篇阅读材料10个作业1个讨论话题

This module delves into security policies and access control, which are crucial for managing and restricting access to sensitive information. Learners will explore various types of access control mechanisms and how these are enforced through policy frameworks. The module also discusses confidentiality, integrity, and hybrid policies, giving a foundational understanding of how organisations safeguard data against unauthorised use.

涵盖的内容

7个视频3篇阅读材料8个作业1个讨论话题

This module focuses on implementing security at different layers of the OSI model, from network to application. Learners will gain hands-on knowledge of security protocols such as IPSec, TLS/SSL, and secure application communication. The module also introduces real-world attack vectors and how to defend against them using layered security approaches.

涵盖的内容

13个视频3篇阅读材料12个作业1个讨论话题

This module explores various network defenses and system-level protections, including intrusion detection/prevention systems, firewalls, and secure OS configurations. Learners will also explore secure software development practices, physical infrastructure security, and the role of human factors in cybersecurity.

涵盖的内容

15个视频4篇阅读材料14个作业1个讨论话题

This module introduces learners to threat modelling techniques and frameworks such as attack trees and the cyber kill chain. It also covers attack classification databases (CAPEC, CVE, CVSS), incident response procedures, and the legal and ethical dimensions of cybersecurity. The module culminates in a staff-graded assessment for applied learning.

涵盖的内容

11个视频4篇阅读材料11个作业1个讨论话题

This module provides a foundational understanding of information security, its key components, and the evolution of encryption techniques. It introduces the classical encryption techniques like substitution and Caesar ciphers, and the mathematical foundations behind these methods.

涵盖的内容

8个视频8篇阅读材料9个作业1个讨论话题

This module introduces encryption fundamentals, focusing on public and private key cryptographic techniques. It explores the differences between symmetric and asymmetric encryption, the working mechanisms of stream and block ciphers, and their practical applications in modern security.

涵盖的内容

8个视频7篇阅读材料7个作业1个讨论话题

This module delves into asymmetric encryption techniques. It covers RSA and Diffie-Hellman algorithms, block cipher modes of operation, and challenges in modern cryptography, including quantum threats. Learners will explore how these techniques are applied in real-world systems and examine the trade-offs between security, performance, and scalability.

涵盖的内容

13个视频12篇阅读材料13个作业1个讨论话题

This module introduces asymmetric cryptography, focusing on the RSA algorithm and key establishment techniques such as Diffie-Hellman Key Exchange (DHKE). It highlights how asymmetric methods ensure data confidentiality and support secure communication.

涵盖的内容

7个视频6篇阅读材料6个作业1个讨论话题

This module covers the concepts of data integrity and authentication, focusing on hash functions and Message Authentication Codes (MACs). It explains how these cryptographic tools are used to verify the integrity and authenticity of information.

涵盖的内容

7个视频6篇阅读材料8个作业1个讨论话题

Final Comprehensive Examination

涵盖的内容

1个作业

位教师

Rajesh Kumar
Birla Institute of Technology & Science, Pilani
3 门课程444 名学生
Prof. Hemant Rathore
Birla Institute of Technology & Science, Pilani
1 门课程443 名学生

提供方

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'

从 Information Technology 浏览更多内容