This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Interest in information security has been spurred by the pervasive use of computer-based applications such as information systems, databases, and the Internet. Information security has also emerged as a national goal in the United States and in other countries with national defense and homeland security implications. Information security is enabled through securing data, computers, and networks. In this course, we will look into such topics as fundamentals of information security, computer security technology and principles, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment. By the end of this course, you will be able to describe major information security issues and trends, and advise an individual seeking to protect his or her data.
Type of Material:
Online Course
Recommended Uses:
class lectures, self paced
Technical Requirements:
browser and internet.
This course is delivered fully online. You will be required to have access to a computer or web-capable mobile device and have consistent access to the internet to either view or download the necessary course resources and to attempt any auto-graded course assessments and the final exam.
To access the full course including assessments and the final exam, you will need to be logged into your Saylor Academy account and enrolled in the course. If you do not already have an account, you may create one, free of charge, here. Although you can access some course resources without being logged into your account, it’s advised that you log in to maximize your course experience. For example, some of the accessibility and progress tracking features are only available when you are logged in.
Identify Major Learning Goals:
• explain the challenges and scope of information security;• explain such basic security concepts as confidentiality, integrity, and availability, which are used frequently in the field of information security; • explain the importance of cryptographic algorithms used in information security in the context of the overall information technology (IT) industry; • identify and explain symmetric algorithms for encryption-based security of information; • identify and explain public-key based asymmetric algorithms for encryption-based security of information; • describe the access control mechanism used for user authentication and authorization; • describe Secure Sockets Layer (SSL) as a common solution enabling security of many applications, including all Internet-based commerce; • describe securing Internet Protocol (IP) communications by using Internet Protocol Security (IPSec); • explain the importance of physical security and discuss ways to improve physical security of an enterprise; • explain the use of such security tools as firewalls and intrusion prevention systems; • explain malicious software issues such as those introduced by software-based viruses and worms; • explain common software security issues such as buffer overflow; and • describe the basic process of risk assessment in the context of overall IT security management.
Target Student Population:
High School, College General Ed, Graduate School, Professional
CS Students
Prerequisite Knowledge or Skills:
CS101: Introduction to Computer Science I, CS102: Introduction to Computer Science II, CS202: Discrete Structures (optional, but knowledge of the basics of discrete mathematics concepts will be a significant help in this course), CS303: Algorithms (optional)
Content Quality
Rating:
Strengths:
the content is done by experts and professors and is reviewed too
Concerns:
the last time stamp was showing 2018, i am not sure whether the content was refreshed to reflect new developments in the field
Assignments needed in order to make full benefit of the course
Potential Effectiveness as a Teaching Tool
Rating:
Strengths:
•Self-learning at your own pace •Smooth transition between parts •Realistic examples (e.g. NASA’s own physical security
Concerns:
Just make sure the content is not too dated
Only the structure is open source. All other materials are copyrighted •measuring Outcomes not possible for guests
Ease of Use for Both Students and Faculty
Rating:
Strengths:
you need to log in to the site and this way you can earn a certificate and possible college credit.
The course structure is organized
Easy to navigate
Concerns:
Internet connection required
Creative Commons:
Search by ISBN?
It looks like you have entered an ISBN number. Would you like to search using what you have
entered as an ISBN number?
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.