Welcome visitor you can login or create an account.
ADL is a leading provider of Distance Learning, Home Study & Online Courses

Information Security

Discipline:

Technology Courses Online 

Information Security

Price: £340.00Course Code: BIT203 CLD
Contact us
Currency Converter
reviews
View As PDFEmail This

Learning Methods

* Select your Learning Materials:
otipPlease select your how you would like to receive the course materials:

* Pay in Full or Select your Interest Free Payment Plan:

Add to Wish List
Contact us
No questions have been posted about this product.

Ask a question

Note: HTML is not translated!

Information Security

Information Security course online. Information Security has always been a vital component of information systems, and ever since the rise of the Internet back in the early 1990’s, information systems have become increasingly accessible by people across the globe. Today, security is one of the highest priorities in most organisations and more and more home users are getting the message and becoming aware of the importance of information security.


Learn to keep information on your computer secure. A course equally important for the individual through to the largest corporation.
The most important security concepts related to information on the internet are confidentiality, integrity and availability, whereas the most important concepts related to the people using the information on the internet are authorisation, authentication and non-repudiation.

Lesson Structure: Information Security BIT206

There are 11 lessons in this course:

  1. Introduction to Information Security   
    • Need for Security
    • Basic Security Concepts
    • Security Breaches and Intrusions
    • Types of Threats
    • Threat Assessment
    • Vulnerability Assessment
    • Security through Obscurity
    • Hackers
    • Crackers
    • The Difference between Hackers and Crackers
    • IP Spoofing
    • Blind Spoofing
    • Man in the Middle Attack
    • Denial of Service
    • Distributed Denial of Service
    • Phishing
    • How to Defend against Spoofing
    • What is a Botnet
    • Types of bots and their Malicious Use
  2. Information Security Ethics
    • Ethical Issues facing IT Professionals
    • Legal Issues facing IT Professionals
    • Intellectual Property Rights
  3. Data Integrity and Backing up
    • What is Data Integrity
    • Protection
    • Detection
    • Correction
    • What is Data backup
    • Full backup
    • Incremental backup
    • Mirror backup
    • Offsite backup
    • Offsite versus Onsite Backup
    • Disk based versus Tape based Backup
    • Online backup
  4. Vulnerabilities of Operating Systems and Information Systems
    • What is Vulnerability
    • Operating Systems and Software Vulnerability
    • Running Virus Protection Software
    • Updating Security Patches for Software
    • Approved Software
    • FTP Vulnerability
    • Trojan Horses
    • Who is at Risk of Trojan Horses
    • Protection against Trojans
  5. Risk Management
    • What is Risk Management
    • Key Roles in the Risk Management Process
    • Risk Assessment
    • Characterising the System
    • Identifying Threats
    • Control Analysis
    • Determining Likelihood Ratings
    • Analyzing the Impact
    • Determining the Risks
    • Controls Recommendations
    • Risk Mitigation
    • Risk Evaluation
  6. Information Security Technologies, Developments and Initiatives
    • What is VPN (Virtual Private Network)
    • Features and Benefits of VPN
    • Components of Remote Access VPN
    • Protocols Used in VPN Connections
    • Advantages and Disadvantages of VPN
    • What is a Firewall
    • Main Functions of Firewalls
    • Packet Filtering
    • Circuit Relay
    • Application Gateway
    • Firewall Rules
    • What are Intrusion Detection Systems (IDS)
    • Types of IDS
    • IDS versus Firewalls
  7. Physical Security
    • What is Physical Security?
    • Natural Disasters and Controls
    • Lightning
    • Power Loss
    • Fire
    • Earthquake
    • Liquid Leakage
    • The Human Factor
    • Locks
    • Tokens
    • Challenge-response Tokens
    • Dumb Cards
    • Smart Cards
    • Biometric Devices
    • Fingerprint Scanners
    • Retnal Scan Devices
    • Palm Scan Devices
    • Hand Geometry Devices
    • Facial Recognition Devices
  8. Developing a security Policy
    • Introduction
    • Need for Security
    • Importance of Security Policy
    • Developing a Security Policy
  9. Implementing and revising a security policy
    • Introduction
    • Communicating the Security Policy
    • Enforcing the Security Policy
    • Assessing the Security Policy
    • Common Security Policies
    • Password Policy
    • Access Control Policy
    • Displaying a Warning Notice
    • Audit Policy
    • Server Security Policy
    • Automatically Forwarded Emailsa Policy
    • Information Sensitivity Policy
    • Anti Virus Policy
    • Remote Access Policy
    • Wireless Communication Policy
  10. Business Continuity and Disaster Recovery Planning
    • Difference between disaster recover and business continuity?
    • Disaster recovery plan
    • Business continuity plan
  11. Information Security Maintenance
    • Time Management
    • Networking
    • Management
    • Attitude
    • Procedures
    • Products and Services
    • The Law

Each lesson culminates in an assignment which is submitted to the school, marked by the school’s tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.

Key Issues

A key issue with displaying information on the internet or on any other information system is to make sure that only the authorised people are able to view that information, because confidentiality is a very important attribute when it comes to information security.  In some countries, there is a need to protect the privacy of individuals and prevent unlawful access to their information. This includes, but is not limited to: information stored in banks, hospitals and medical records, medical laboratories and medical research data, the tax office and many others.

When private information is circulating on an insecure network, it may be subject to many forms of misuse, including theft and corruption. Data corruption occurs when information is modified by a third-party, thus resulting in the loss of integrity for this data. It is important to note that information can be modified by people with or without malicious intent; for this reason, it is important to keep confidential information secure at all times, to avoid any accidental tampering (such as human error) or intentional tampering.

Needless to say, it is always important to maintain data integrity during any type of communication, but in critical cases such as EFT (electronic funds transfer), army and security agencies communications, and air traffic control, maintaining data integrity becomes an absolute necessity. This means that extreme care should be taken to prevent data from being deleted, modified, or becoming inaccessible, this resulting in loss of data availability and people won’t be able to access the information when required.

To secure data availability on the network, it is important to reduce network outages as much as possible, because the availability of the network itself is extremely important. If the network is down, network users will not be able to access the network and any resources available on that network.

Most organizations nowadays apply some form of security to restrict unlawful access to data stored on their networks. This is mainly achieved by using authentication and authorisation which will be explained below:

Authentication on a network provides a proof that a network user is indeed the person they are claiming to be, either by asking the user to input a password (something they know), a smartcard (something they have), or a biometric identity print (such as a finger print).

Authorization on a network provides a proof that a certain network user has the right to read a file, run a program, delete a folder, or perform other network activities.

It is important to understand that authentication and authorization work together, because a user needs to be authenticated first before they can be authorised to perform network activities

Course Info
Course StartAnytime, anywhere
Course Prerequisite No, start at anytime
Course Qualification (Study Option B)Level 4 Certificate in Information Security
Comparative Credits InformationBIT206
Course Duration and DeadlinesASIQUAL. Asiqual awards qualifications at levels 3-7, which equate to undergraduate and post-graduate degree level.
Study Support
Recognition of Your Course By EmployersFinalised with an exam/test
Recognition of Your Course By Universities100
Designing Your Own Qualification10 Credits
How Can I Enrol?You'll be allocated your own personal tutor/mentor who will support and mentor you throughout your whole course. Our tutors/mentors have been specifically chosen for their business expertise, qualifications and must be active within their industry. Tutors are contactable by e-mail, telephone and through our Moodle Student Support Zone online. Tutors are there to provide assistance with course material, discuss, explain and give advice and support throughout the whole programme. Their feedback is vital to your success.

                                                                             

 

Previous Customer Experiences with our Courses

"Fantastic Teacher. Well organised modules. Assignments force me to learn and research more so I can prepare well for exams. I really enjoyed studying via ADL.  I can now continue study at Ulster University which accept my certificate from ADL".    Level 4,  Advanced Certificate in Applied Science,  VSC001,  Stanislawa,  Poland.

Its with great pleasure I am announcing you my new job as 'Park Manager' for a 5 star hotel in Reunion Island.  Its definitely my courses with ADL (Botany, Agronomy and Tree for Rehabilitation) which were decisive for my nomination. Accordingly, my sincere thanks goes to all the ADL team.

"The course was a valuable learning experience as it provided me with the knowledge and understanding for me as a Careers Advisor. The feedback was very good from my tutor, and allowed me to  build upon my assignments that were marked. The comments were very informative  and very useful. Well written course material."  Andrew W, Careers  Counselling, UK

"It exceeded my expectations. It was more comprehensive than I expected and the assignments really stimulated deep study of the subject. Thank you for your guidance. I am delighted with my certificate and will recommend this course and ADL to my friends and colleagues."  G Flaherty, Ornithology BEN102, Ireland

"I want to thank you for  the course - Hotel Management- I've just finished now. The course was comprehensive and well edited. For sure it can give a new worker in the hospitality industry the basic theoretical and practical knowledge required".  Daniel K, Hotel Management, Romania

"Upon completing the Interior Plants Course I was offered my dream job.  Taking this class was one of the best decisions I've made, the information I received was invaluable.  Thank you ADL". Meg V,  Interior Plants, Florida, USA.

“I am delighted to report that I passed the exam and received a “Pass with Commendation”. I appreciate very much the detail that you went into, in the correction of my assignments  and I found your advice and extra subject information  invaluable in advancing my interest and knowledge in horticulture”.   Go raibh mile maith agat! (a thousand thanks!) Colin, RHS Cert II, Ireland

"Although my main interest in Earth Science is Geology I found this course excellent. The course notes were very interesting and useful throughout the course. Thank you to the ADL staff for their excellent service" Barry. Earth Science

"I received good feedback, and had an efficient turnaround of assignments, useful comments and grades to analyse." Andrew, Calf Rearing

"I enjoyed the course and developed a good understanding of learning and behaviour disorders. I feel this will be helpful in my role as a Clerk at a local primary school". The course met my expectations and I enjoyed the challenge of learning about conditions i knew little about. The presentation of the course and the opportunity to communicate with my tutor was valuable. I enjoyed the course so much , I am planning to do another! Jennifer C, Developmental Learning and Behavioural Disorders in Children and Adolescents, UK

More Reviews....


 

Contact Us
First Name:

Email Address:

Phone Number:

Enquiry:

Get an Information Pack

Other (write below)

Disclaimer: Every attempt is made to ensure all information from the academy is accurate and that the student has attained the competencies taught in a course, at the point of their assessment. Beyond this point, the graduate is responsible to maintain their acquired competencies, and apply acquired knowledge and skills in a way which is appropriate to the unique characteristics of each application. This will release the academy from any liability, action and claims of whatsoever nature in connection with, or arising from any such information, instruction or advice, given by any student or ex-student, whether directions given during the course are followed or not.