The course "Information Security" aims to prepare you for a deeper understanding and application of information security principles and practices essential for today’s digital landscape. In this course, you’ll be introduced to the fundamental concepts of securing information systems, program security, database integrity, operating system protections, cloud security, and privacy frameworks. You’ll learn about various types of security threats, vulnerabilities, and defences, as well as the legal and ethical dimensions of cybersecurity. The course covers a wide variety of topics, from program-level safeguards to physical security and auditing practices. These topics are designed to give you an overview of critical areas within the field, serving as a foundation for further specialisation and research in your degree program. Whether you're interested in secure software design, cloud infrastructure security, or the evolving challenges in privacy and anonymity, this course offers a comprehensive starting point to build your expertise in cybersecurity.

推荐体验
推荐体验
中级
Basic knowledge of computer systems, networking, and programming, along with familiarity with operating systems and databases, is recommended.
推荐体验
推荐体验
中级
Basic knowledge of computer systems, networking, and programming, along with familiarity with operating systems and databases, is recommended.
您将学到什么
Analyse various security threats, vulnerabilities, and corresponding mitigation techniques to protect information systems.
Design secure programs, databases, and operating systems by applying principles of secure software development and system protection.
Evaluate privacy, legal, and ethical considerations in implementing cybersecurity solutions across diverse environments.
要了解的详细信息

添加到您的领英档案
99 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有12个模块
In this module, the learners will be introduced to the course and its syllabus, setting the foundation for their learning journey. The course's introductory video will provide them with insights into the valuable skills and knowledge they can expect to gain throughout the duration of this course. Additionally, the syllabus reading will comprehensively outline essential course components, including course values, assessment criteria, grading system, schedule, details of live sessions, and a recommended reading list that will enhance the learner’s understanding of the course concepts. Moreover, this module offers the learners the opportunity to connect with fellow learners as they participate in a discussion prompt designed to facilitate introductions and exchanges within the course community.
涵盖的内容
3个视频1篇阅读材料1个讨论话题
3个视频•总计4分钟
- Meet Your Instructor - Dr. Rajesh Kumar•1分钟
- Meet Your Instructor - Prof. Hemath Rathore•2分钟
- Course Introductory Video•1分钟
1篇阅读材料•总计10分钟
- Course Overview •10分钟
1个讨论话题•总计10分钟
- Meet Your Peers•10分钟
This module provides an overview of information security, covering its foundational concepts, evolution, key components, and importance in the digital age. It introduces the concepts of risks, vulnerabilities, threats, and the motivations of threat actors, laying the groundwork for understanding the modern cybersecurity landscape.
涵盖的内容
11个视频3篇阅读材料10个作业1个讨论话题
11个视频•总计145分钟
- Foundations of Information Security - 1•9分钟
- Foundations of Information Security - 2•14分钟
- Foundations of Information Security - 3•9分钟
- Threats, Vulnerabilities and Attacks•9分钟
- Computer Malware•15分钟
- Phishing Attack•8分钟
- Ransomware Attacks•5分钟
- DoS Attacks•4分钟
- Information Security Framework and Standards•7分钟
- Design Principles•7分钟
- Recording of Information Security: Week 1 - Live Session on 25-05-23 18:32:34 [56:43]•57分钟
3篇阅读材料•总计100分钟
- Recommended Reading: Overview of Information Security•30分钟
- Recommended Reading: Attacks and Vulnerability in Information Security•30分钟
- Recommended Reading: Information Security Risk Management - Tools & Technique•40分钟
10个作业•总计69分钟
- Foundations of Information Security - 1•9分钟
- Foundations of Information Security - 2•9分钟
- Foundations of Information Security - 3•9分钟
- Threats, Vulnerabilities and Attacks•6分钟
- Computer Malware•6分钟
- Phishing Attack•6分钟
- Ransomware Attacks•6分钟
- DoS Attacks•6分钟
- Information Security Framework and Standards•6分钟
- Design Principles•6分钟
1个讨论话题•总计30分钟
- Foundations of Information Security: Risks, Attacks, and Prevention•30分钟
This module delves into security policies and access control, which are crucial for managing and restricting access to sensitive information. Learners will explore various types of access control mechanisms and how these are enforced through policy frameworks. The module also discusses confidentiality, integrity, and hybrid policies, giving a foundational understanding of how organisations safeguard data against unauthorised use.
涵盖的内容
7个视频3篇阅读材料8个作业1个讨论话题
7个视频•总计76分钟
- Introduction to Security Policies•9分钟
- Mechanism Ensuring Security Policy•4分钟
- Introduction to Access Control•11分钟
- Access Control Mechanisms•11分钟
- Confidentiality Policy•15分钟
- Integrity Policies•17分钟
- Hybrid Policies•8分钟
3篇阅读材料•总计140分钟
- Recommended Reading: Security Policies•40分钟
- Recommended Reading: Access Control•50分钟
- Recommended Reading: Security Policy Frameworks•50分钟
8个作业•总计138分钟
- Introduction to Security Policies •9分钟
- Mechanism Ensuring Security Policy •9分钟
- Introduction to Access Control •12分钟
- Access Control Mechanisms •12分钟
- Confidentiality Policy •12分钟
- Integrity Policies •12分钟
- Hybrid Policies •12分钟
- Graded Quiz - Modules 1 and 2 •60分钟
1个讨论话题•总计30分钟
- Securing Systems Through Access Control and Policy Frameworks•30分钟
This module focuses on implementing security at different layers of the OSI model, from network to application. Learners will gain hands-on knowledge of security protocols such as IPSec, TLS/SSL, and secure application communication. The module also introduces real-world attack vectors and how to defend against them using layered security approaches.
涵盖的内容
13个视频3篇阅读材料12个作业1个讨论话题
13个视频•总计135分钟
- Network Layer Security•9分钟
- IPSec and Security Associations•9分钟
- IPSec Protocols and Encryption•8分钟
- TLS / SSL Protocols•7分钟
- SSL Handshake•6分钟
- Authentication and Key Distribution•7分钟
- Secure Remote Access•7分钟
- Email Security•8分钟
- Web Security - Setup•8分钟
- Cookie Theft•6分钟
- Attacks on Web Applications•9分钟
- Cross Site Scripting•5分钟
- Recording of Information Security: Week 2 - Live Session on 25-06-02 19:37:37 [46:43]•47分钟
3篇阅读材料•总计190分钟
- Recommended Reading: Network Security•60分钟
- Recommended Reading: Security at Transport Layer•50分钟
- Recommended Reading: Security at Application Layer•80分钟
12个作业•总计72分钟
- Network Layer Security•6分钟
- IPSec and Security Associations•6分钟
- IPSec Protocols and Encryption•6分钟
- TLS/ SSL Protocols•6分钟
- SSL Handshake•6分钟
- Authentication and Key Distribution•6分钟
- Secure Remote Access•6分钟
- Email Security•6分钟
- Web Security - Setup•6分钟
- Cookie Theft•6分钟
- Attacks on Web Applications•6分钟
- Cross Site Scripting•6分钟
1个讨论话题•总计30分钟
- Layered Security: Defending Systems Across the OSI Stack•30分钟
This module explores various network defenses and system-level protections, including intrusion detection/prevention systems, firewalls, and secure OS configurations. Learners will also explore secure software development practices, physical infrastructure security, and the role of human factors in cybersecurity.
涵盖的内容
15个视频4篇阅读材料14个作业1个讨论话题
15个视频•总计264分钟
- Intrusion Detection Systems - Fundamentals •7分钟
- Types of Intrusion Detection System•9分钟
- Intrusion Prevention System (IPS)•3分钟
- Firewall Fundamentals•4分钟
- Firewalls Configurations•4分钟
- CPU Modes •8分钟
- UNIX Access Control•10分钟
- Operating System Security: Best Practices•7分钟
- Secure Software Development •8分钟
- Buffer Overflow•12分钟
- Common Software Vulnerabilities and Best Practices•14分钟
- Physical and Cyber Attacks•7分钟
- Human Factors•10分钟
- Recording of Information Security: Week 3 - Live Session on 25-06-09 18:44:17 [51:53]•52分钟
- Recording of Information Security: Week 4 - Live Session on 25-06-13 18:34:20 [49:14]•109分钟
4篇阅读材料•总计240分钟
- Recommended Reading: Network Defenses •60分钟
- Recommended Reading: Securing Operating Systems•60分钟
- Recommended Reading: Program Security•60分钟
- Recommended Reading: Physical and Infrastructure Security•60分钟
14个作业•总计177分钟
- Intrusion Detection Systems - Fundamentals •9分钟
- Types of Intrusion Detection System•9分钟
- Intrusion Prevention System (IPS)•9分钟
- Firewall Fundamentals•9分钟
- Firewall Configurations•9分钟
- CPU Modes •9分钟
- UNIX Access Control•9分钟
- Operating System Security: Best Practices•9分钟
- Secure Software Development •9分钟
- Buffer Overflow•9分钟
- Common Software Vulnerabilities and Best Practices•9分钟
- Physical and Cyber Attacks•9分钟
- Human Factors•9分钟
- Graded Quiz - Modules 3 and 4 •60分钟
1个讨论话题•总计30分钟
- Fortifying the Foundations: Exploring Security and Network Defenses•30分钟
This module introduces learners to threat modelling techniques and frameworks such as attack trees and the cyber kill chain. It also covers attack classification databases (CAPEC, CVE, CVSS), incident response procedures, and the legal and ethical dimensions of cybersecurity. The module culminates in a staff-graded assessment for applied learning.
涵盖的内容
11个视频4篇阅读材料11个作业1个讨论话题
11个视频•总计122分钟
- Threat Modelling Basics •11分钟
- Cyber Kill Chain•5分钟
- Attack Tree•11分钟
- CAPEC •5分钟
- CVE•9分钟
- CVSS•14分钟
- CVSS Scoring - An Example•3分钟
- Incident Response Technologies•9分钟
- Ethical Dilemma•7分钟
- Legal Frameworks in Information Security•7分钟
- Recording of Information Security: Week 5 - Live Session on 25-06-20 18:34:58 [45:59]•41分钟
4篇阅读材料•总计300分钟
- Recommended Reading: Threat Modelling Frameworks•90分钟
- Recommended Reading: Attack Databases•90分钟
- Recommended Reading: Incident Response•60分钟
- Recommended Reading: Legal and Ethical Aspects•60分钟
11个作业•总计210分钟
- Threat Modelling Basics •9分钟
- Cyber Kill Chain•9分钟
- Attack Tree•9分钟
- CAPEC •9分钟
- CVE (Common Vulnerabilities and Exposures)•9分钟
- CVSS (Common Vulnerability Scoring System)•9分钟
- CVSS Scoring - An Example•9分钟
- Incident Response Technologies•9分钟
- Ethical Dilemma•9分钟
- Legal Frameworks in Information Security•9分钟
- SGA-1: Implementing Security Measures for a Modern IP Network•120分钟
1个讨论话题•总计30分钟
- Anticipate and Respond: The Role of Threat Modelling and Incident Response•30分钟
This module provides a foundational understanding of information security, its key components, and the evolution of encryption techniques. It introduces the classical encryption techniques like substitution and Caesar ciphers, and the mathematical foundations behind these methods.
涵盖的内容
8个视频8篇阅读材料9个作业1个讨论话题
8个视频•总计80分钟
- CIA Triad•12分钟
- Model for Network Security•12分钟
- Types of Network Attacks•9分钟
- Kerckhoff Principle and Substitution Cipher•11分钟
- Caesar Cipher•9分钟
- Attacks and Limitations of Historical Ciphers•10分钟
- Introduction to Modular Arithmetic•12分钟
- Ring in Modular Arithmetic•5分钟
8篇阅读材料•总计115分钟
- Essential Reading: CIA Triad•15分钟
- Recommended Reading: Model for Network Security•15分钟
- Recommended Reading: Types of Network Attacks•15分钟
- Essential Reading: Kerckhoff Principle and Substitution Cipher•15分钟
- Recommended Reading: Caesar Cipher•15分钟
- Recommended Reading: Attacks and Limitations of Historical Ciphers•15分钟
- Essential Reading: Introduction to Modular Arithmetic•15分钟
- Recommended Reading: Ring in Modular Arithmetic•10分钟
9个作业•总计150分钟
- CIA Triad•6分钟
- Model for Network Security•12分钟
- Types of Network Attacks•12分钟
- Kerckhoff Principle and Substitution Cipher•12分钟
- Caesar Cipher•6分钟
- Attacks and Limitations of Historical Ciphers•12分钟
- Introduction to Modular Arithmetic•15分钟
- Ring in Modular Arithmetic•15分钟
- Graded Quiz - Modules 5 and 6 •60分钟
1个讨论话题•总计30分钟
- Lessons from Classical Ciphers in the Modern Era•30分钟
This module introduces encryption fundamentals, focusing on public and private key cryptographic techniques. It explores the differences between symmetric and asymmetric encryption, the working mechanisms of stream and block ciphers, and their practical applications in modern security.
涵盖的内容
8个视频7篇阅读材料7个作业1个讨论话题
8个视频•总计143分钟
- Overview of Symmetric and Asymmetric Cryptography •12分钟
- Stream Cipher (Part-1)•10分钟
- Stream Cipher (Part-2) •6分钟
- Stream Cipher (Part-3) •11分钟
- Random Number Generators (RNGs)•10分钟
- RC4 (Rivest Cipher 4)•15分钟
- RC4 (Example)•12分钟
- Recording of Information Security: Week 7 - Live Session on 25-07-04 18:45:36 [07:17]•67分钟
7篇阅读材料•总计102分钟
- Essential Reading: Overview of Symmetric and Asymmetric Cryptography•15分钟
- Essential Reading: Stream Cipher (Part-1)•15分钟
- Recommended Reading: Stream Cipher (Part-2)•10分钟
- Recommended Reading: Stream Cipher (Part-3) •15分钟
- Recommended Reading: Random Number Generators (RNGs)•15分钟
- Essential Reading: RC4 (Rivest Cipher 4)•17分钟
- Recommended Reading: RC4 Example•15分钟
7个作业•总计90分钟
- Overview of Symmetric and Asymmetric Cryptography•30分钟
- Stream Cipher (Part-1)•12分钟
- Stream Cipher (Part-2) •3分钟
- Stream Cipher (Part-3) •6分钟
- Random Number Generators (RNGs)•9分钟
- RC4 (Rivest Cipher 4)•18分钟
- RC4 Example•12分钟
1个讨论话题•总计10分钟
- Stream Ciphers vs. Block Ciphers: Choosing the Right Tool•10分钟
This module delves into asymmetric encryption techniques. It covers RSA and Diffie-Hellman algorithms, block cipher modes of operation, and challenges in modern cryptography, including quantum threats. Learners will explore how these techniques are applied in real-world systems and examine the trade-offs between security, performance, and scalability.
涵盖的内容
13个视频12篇阅读材料13个作业1个讨论话题
13个视频•总计188分钟
- Basics of Block Cipher•11分钟
- AES (Part-1)•11分钟
- AES (Part-2)•4分钟
- AES (Part-3)•9分钟
- AES (Part-4)•7分钟
- AES (Part-5)•16分钟
- Block Cipher Modes (Part-1) •11分钟
- Block Cipher Modes (Part-2)•10分钟
- Block Cipher Modes (Part-3)•14分钟
- Brute Force Attack•7分钟
- Double Encryption•12分钟
- Triple Encryption•9分钟
- Recording of Information Security: Week 8 - Live Session on 25-07-11 18:55:10 [09:07]•69分钟
12篇阅读材料•总计165分钟
- Essential Reading: Basics of Block Cipher•15分钟
- Recommended Reading: AES (Part-1)•15分钟
- Recommended Reading: AES (Part-2)•10分钟
- Recommended Reading: AES (Part-3)•15分钟
- Recommended Reading: AES (Part-4)•15分钟
- Recommended Reading: AES (Part-5)•15分钟
- Essential Reading: Block Cipher Modes (Part-1)•15分钟
- Recommended Reading: Block Cipher Modes (Part-2)•15分钟
- Recommended Reading: Block Cipher Modes (Part-3)•15分钟
- Essential Reading: Brute Force Attack•10分钟
- Recommended Reading: Double Encryption•15分钟
- Recommended Reading: Triple Encryption•10分钟
13个作业•总计150分钟
- Basics of Block Cipher•6分钟
- AES (Part-1)•6分钟
- AES (Part-2)•6分钟
- AES (Part-3)•6分钟
- AES (Part-4)•3分钟
- AES (Part-5)•3分钟
- Block Cipher Modes (Part-1)•9分钟
- Block Cipher Modes (Part-2)•6分钟
- Block Cipher Modes (Part-3)•15分钟
- Brute Force Attack•6分钟
- Double Encryption•12分钟
- Triple Encryption•12分钟
- Graded Quiz - Modules 7 and 8 •60分钟
1个讨论话题•总计30分钟
- The Importance of Block Cipher Modes of Operation•30分钟
This module introduces asymmetric cryptography, focusing on the RSA algorithm and key establishment techniques such as Diffie-Hellman Key Exchange (DHKE). It highlights how asymmetric methods ensure data confidentiality and support secure communication.
涵盖的内容
7个视频6篇阅读材料6个作业1个讨论话题
7个视频•总计135分钟
- Introduction to Asymmetric Cryptosystem•14分钟
- RSA Algorithm•16分钟
- RSA Example•16分钟
- Introduction•16分钟
- DHKE (Part-1)•10分钟
- DHKE (Part-2)•13分钟
- Recording of Information Security: Week 9 - Live Session on 25-07-18 18:49:47 [49:06]•49分钟
6篇阅读材料•总计90分钟
- Essential Reading: Introduction to Asymmetric Cryptosystem•15分钟
- Recommended Reading: RSA Algorithm•15分钟
- Recommended Reading: RSA Example•15分钟
- Essential Reading: Introduction•15分钟
- Recommended Reading: DHKE (Part-1)•15分钟
- Recommended Reading: DHKE (Part-2)•15分钟
6个作业•总计60分钟
- Introduction to Asymmetric Cryptosystem•12分钟
- RSA Algorithm•12分钟
- RSA Example•6分钟
- Introduction•9分钟
- DHKE (Part-1)•9分钟
- DHKE (Part-2)•12分钟
1个讨论话题•总计30分钟
- RSA vs. Diffie-Hellman: Different Tools for Different Asymmetric Tasks•30分钟
This module covers the concepts of data integrity and authentication, focusing on hash functions and Message Authentication Codes (MACs). It explains how these cryptographic tools are used to verify the integrity and authenticity of information.
涵盖的内容
7个视频6篇阅读材料8个作业1个讨论话题
7个视频•总计125分钟
- Introduction to Hash Functions•13分钟
- Hash Functions•15分钟
- Different Hash Functions •11分钟
- Message Authentication Code (Part-1)•15分钟
- Message Authentication Code (Part-2)•15分钟
- Message Authentication Code (Part-3)•10分钟
- Recording of Information Security: Week 10 - Live Session on 25-07-25 18:46:02 [44:53]•45分钟
6篇阅读材料•总计85分钟
- Essential Reading: Introduction to Hash Functions•15分钟
- Recommended Reading: Hash Functions•15分钟
- Recommended Reading: Different Hash Functions •10分钟
- Essential Reading: Message Authentication Code (Part-1)•15分钟
- Recommended Reading: Message Authentication Code (Part-2)•15分钟
- Recommended Reading: Message Authentication Code (Part-3)•15分钟
8个作业•总计240分钟
- Introduction to Hash Functions•6分钟
- Hash Functions•12分钟
- Different Hash Functions •12分钟
- Message Authentication Code (Part-1)•18分钟
- Message Authentication Code (Part-2)•6分钟
- Message Authentication Code (Part-3)•6分钟
- Graded Quiz - Modules 9 and 10•60分钟
- SGA -2 •120分钟
1个讨论话题•总计30分钟
- Hash Functions vs. MACs: When is Integrity Not Enough?•30分钟
Final Comprehensive Examination
涵盖的内容
1个作业
1个作业•总计30分钟
- Final Comprehensive Examination•30分钟
位教师


提供方

提供方

Birla Institute of Technology & Science, Pilani (BITS Pilani) is one of only ten private universities in India to be recognised as an Institute of Eminence by the Ministry of Human Resource Development, Government of India. It has been consistently ranked high by both governmental and private ranking agencies for its innovative processes and capabilities that have enabled it to impart quality education and emerge as the best private science and engineering institute in India. BITS Pilani has four international campuses in Pilani, Goa, Hyderabad, and Dubai, and has been offering bachelor's, master’s, and certificate programmes for over 58 years, helping to launch the careers for over 1,00,000 professionals.
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
从 Information Technology 浏览更多内容
EEC-Council
课程
LLearnKartS
课程
PPackt
课程

