Information Assurance and Security

Categories: IT
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Information Assurance and Security: Protecting Digital Assets & Beyond

This course introduces the foundational principles of Information Assurance and Security (IAS), centered on the CIA Triad (Confidentiality, Integrity, Availability). Students will explore the evolving landscape of cyber threats, vulnerabilities, and attacks, alongside the critical legal, ethical, and professional issues in information security. Essential domains like risk management, access control, cryptography, and physical security are covered, equipping students with the core knowledge to safeguard digital information in any organizational context.

What Will You Learn?

  • Analyze the core goals of information security: Confidentiality, Integrity, and Availability (CIA Triad).
  • Identify, classify, and understand various security threats, attacks (malware, network attacks), and vulnerabilities.
  • Apply Risk Management principles to identify assets, assess likelihood and impact, and propose mitigation strategies.
  • Evaluate and implement different methods of Identification, Authentication (MFA, Biometrics), and Access Control Models (DAC, MAC, RBAC).
  • Demonstrate an understanding of fundamental Cryptographic concepts including symmetric/asymmetric encryption, hashing, and digital signatures.
  • Adhere to legal, ethical, and professional standards in information security, particularly concerning Data Privacy Act and Cybercrime Prevention Act.
  • Identify and design basic Physical Security measures and understand core Network Security Fundamentals (Firewalls, VPNs).

Course Content

Module 1: Foundations and Threats
This module introduces the fundamental concepts of information security, including the CIA Triad, and then moves into categorizing the diverse landscape of cyber threats, vulnerabilities, and common attack types.

  • Introduction to Information Security & The CIA Triad
    04:07
  • Information Security & CIA Triad Quiz
  • Threats, Attacks, and Vulnerabilities
    05:45
  • Quiz: Threats, Attacks, and Vulnerabilities
  • Preliminary Examination

Module 2: Legal, Ethical, and Risk Management
This module focuses on the non-technical but equally critical aspects of information security: the legal and ethical responsibilities of professionals, and the systematic process of identifying, assessing, and mitigating risks to information assets.

Module 3: Access Control and Cryptography
This module delves into two pillars of digital security: how users gain legitimate access to systems, and the fundamental principles and applications of cryptography to protect data in transit and at rest.

Module 4: Practical Security Measures
The final module addresses the tangible aspects of security, focusing on protecting physical infrastructure and implementing foundational network defense tools to establish a comprehensive "defense in depth" strategy.

Earn a certificate

Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.

selected template

Student Ratings & Reviews

No Review Yet
No Review Yet

Want to receive push notifications for all major on-site activities?