Introduction to Information Security Management
Build your fundamental knowledge of information security management and how it defends an organisation’s data from threats with this online course from Universiti Malaya.
Duration
2 weeks
Weekly study
2 hours
100% online
How it works
Unlimited subscription
Learn more
Established
1905
Location
Kuala Lumpur, Malaysia
World ranking
Source: QS World University Rankings 2021
Modern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, it’s essential that organisations protect it.
On this two-week course, you’ll explore the concept of information security management in protecting an organisation’s data from threats from both humans and nature alike.
This course will guide you through three elements of information security, known as the CIA Triad, that make up the backbone of information security management. You’ll then look at how the CIA Triad works and protects data.
A threat in the context of computer security is a potential negative action or event made possible by a vulnerability which can lead to an unintended effect on a computer system or application.
You’ll explore how a data breach happens, information security vulnerabilities, and the differences between attacks and threats. You’ll also learn how risk connects with vulnerability and threat.
This activity will introduce the instructor and course learning outcome for weeks one and two.
This activity introduces the meaning of information security and how it reflect to our daily life.
This activity discusses the three requirements of information security; confidentiality, integrity and availability.
Let's reflect on what we've covered this week and look at what's coming up next.
This activity introduces the definition of data breach.
This activity explains common types of vulnerabilities that occur in information security.
This activity explains threats and attacks exist in information security. Also explain the differences between threats and attacks.
This activity discusses several types of risks.
Congratulations on reaching the final activity. Let's reflect on what we've covered in week two.
More courses you might like
Learners who joined this course have also enjoyed these courses.
©2025 onlincourse.com. All rights reserved