Learn foundational cyber security principles, from threats to risk management, in this comprehensive introductory course.
Learn foundational cyber security principles, from threats to risk management, in this comprehensive introductory course.
Dive into the world of cyber security with this comprehensive introductory course. Designed for those with a good general knowledge of information and communications technology, this course covers the fundamental concepts of cyber security. You'll explore the nature, scope, and importance of cyber security, examining various types of threats and the range of technological and procedural mechanisms used to address them. The course delves into the role of cryptography in providing security, including how algorithms and keys function. You'll also learn about the critical role of security management in organizations, including risk management and standardized approaches to security. By the end of this course, you'll have a solid foundation in cyber security principles, preparing you for further study or application in your professional life.
4.7
(153 ratings)
20,463 already enrolled
Instructors:
English
21 languages available
What you'll learn
Understand the scope and importance of cyber security in modern digital environments
Explain the key concepts of confidentiality, integrity, and availability (CIA triad) in cyber security
Identify various types of cyber threats and the mechanisms used to address them
Understand the role of cryptography in providing security, including algorithms and key management
Explain the importance of security management in organizations, including risk assessment and policy implementation
Demonstrate knowledge of standardized approaches to security management and compliance
Skills you'll gain
This course includes:
4.4 Hours PreRecorded video
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by
Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.
There are 3 modules in this course
This course provides a comprehensive introduction to the fundamental concepts of cyber security. Students will explore the scope and importance of cyber security, examining key concepts such as confidentiality, integrity, and availability (CIA triad). The course covers various types of cyber threats and the range of technological and procedural mechanisms used to address them. Participants will learn about the role of cryptography in providing security, including the use of algorithms and keys. The course also delves into security management in organizations, introducing concepts like risk management, security policies, and compliance. By the end of the course, students will have a solid foundation in cyber security principles, preparing them for further study or application in their professional lives.
Cyber security basics
Module 1 · 6 Hours to complete
Cryptography – the basics
Module 2 · 7 Hours to complete
Security management
Module 3 · 7 Hours to complete
Fee Structure
Payment options
Financial Aid
Instructor
Pioneering Professor in Information Security and Cyber Security Standardisation
Chris Mitchell has been a Professor of Computer Science at Royal Holloway, University of London since 1990, where he co-founded the influential Information Security Group. He played a pivotal role in creating the groundbreaking MSc in Information Security, which launched in 1992. With a BSc and PhD in Mathematics from Westfield College, University of London, Chris transitioned from industry, where he worked on encryption and network security at Racal Comsec and Hewlett-Packard Labs. Over his career, he has published more than 250 research papers and has been actively involved in cyber security standardisation for over 35 years, serving as editor for over 20 ISO/IEC standards. Additionally, he co-edits the journal Designs, Codes and Cryptography and has supervised over 30 PhD students.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.7 course rating
153 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.