Become An Information Security Specialist
This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks.
Interest in information security has been spurred by the pervasive use of computer-based applications such as information systems, databases, and the Internet. Information security has also emerged as a national goal in the United States and in other countries with national defense and homeland security implications. Information security is enabled through securing data, computers, and networks.
In this course, we will look into such topics as fundamentals of information security, computer security technology and principles, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment. By the end of this course, you will be able to describe major information security issues and trends, and advise an individual seeking to protect his or her data.
Learning new material can be challenging, so below we’ve compiled a few suggested study strategies to help you succeed.
Take notes on the various terms, practices, and theories as you read. This can help you differentiate and contextualize concepts and later provide you with a refresher as you study.
As you progress through the materials, take time to test yourself on what you have retained and how well you understand the the concepts. The process of reflection is important for creating a memory of the materials you learn; it will increase the probability that you ultimately retain the information.
Although you may work through this course completely independently, you may find it helpful to connect with other MathsGee students through the discussion forums or study groups.
Upon successful completion of this course, you will be able to:
- explain the challenges and scope of information security;
- explain such basic security concepts as confidentiality, integrity, and availability, which are used frequently in the field of information security;
- explain the importance of cryptographic algorithms used in information security in the context of the overall information technology (IT) industry;
- identify and explain symmetric algorithms for encryption-based security of information;
- identify and explain public-key based asymmetric algorithms for encryption-based security of information;
- describe the access control mechanism used for user authentication and authorization;
- describe Secure Sockets Layer (SSL) as a common solution enabling security of many applications, including all Internet-based commerce;
- describe securing Internet Protocol (IP) communications by using Internet Protocol Security (IPSec);
- explain the importance of physical security and discuss ways to improve physical security of an enterprise;
- explain the use of such security tools as firewalls and intrusion prevention systems;
- explain malicious software issues such as those introduced by software-based viruses and worms;
- explain common software security issues such as buffer overflow; and
- describe the basic process of risk assessment in the context of overall IT security management.
Throughout this course, you’ll also see related learning outcomes identified in each unit. You can use the learning outcomes to help you organize your learning and gauge your progress.
Lessons Sample lesson
- Before, During, and After Public-Key Cryptography
- Public Key Cryptography
- An Overview of Cryptography: Public-Key Cryptography
- An Overview of Cryptography: Some of the Finer Details of RSA Public-Key Cryptography
- An Overview of Cryptography: Some of the Finer Details of Diffie-Hellman
- CrypTool: http://www.cryptool.org/