Introduction to Information Security Management

Build your fundamental knowledge of information security management and how it defends an organisation’s data from threats with this online course from Universiti Malaya.

Duration

2 weeks

Weekly study

2 hours

100% online

How it works

Unlimited subscription

Learn more

Established

1905

Location

Kuala Lumpur, Malaysia

World ranking

Source: QS World University Rankings 2021

Dive into the concept of information security

Modern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, it’s essential that organisations protect it.

On this two-week course, you’ll explore the concept of information security management in protecting an organisation’s data from threats from both humans and nature alike.

Discover the CIA Triad and how it works

This course will guide you through three elements of information security, known as the CIA Triad, that make up the backbone of information security management. You’ll then look at how the CIA Triad works and protects data.

Explore possible IT vulnerabilities, attacks, and threats

A threat in the context of computer security is a potential negative action or event made possible by a vulnerability which can lead to an unintended effect on a computer system or application.

You’ll explore how a data breach happens, information security vulnerabilities, and the differences between attacks and threats. You’ll also learn how risk connects with vulnerability and threat.

  • Week 1

    Introduction to Information security

    • Getting Started

      This activity will introduce the instructor and course learning outcome for weeks one and two.

    • What is information security

      This activity introduces the meaning of information security and how it reflect to our daily life.

    • Three requirements in information security

      This activity discusses the three requirements of information security; confidentiality, integrity and availability.

    • Weekly wrap up

      Let's reflect on what we've covered this week and look at what's coming up next.

  • Week 2

    Vulnerability, Threats and Attacks

    • Definition of Data breach

      This activity introduces the definition of data breach.

    • Vulnerabilities

      This activity explains common types of vulnerabilities that occur in information security.

    • Differences between Threats and Attacks

      This activity explains threats and attacks exist in information security. Also explain the differences between threats and attacks.

    • What is Risk?

      This activity discusses several types of risks.

    • Weekly wrap up

      Congratulations on reaching the final activity. Let's reflect on what we've covered in week two.

More courses you might like

Learners who joined this course have also enjoyed these courses.

©2025  onlincourse.com. All rights reserved