Call us: +44 (0)1227 789 649 - Monday to Friday 9am to 5pm

Information Security

Information Security 100 Hours Certificate Course

Course Code:
BIT203 CLD
Level:
3
Start:
Anytime
Finish:
Anytime
Study From:
Anywhere
Tutor Support:
Unlimited Access
Pinterest
Twitter
Facebook
Email
LinkedIn

Enrolling Made Simple

From £325

Clear
Contact us!

Learn About Information Security

Information Security Online Course 

Our Information Security Online Course will show you why it has always been a vital component of information systems

Ever since the rise of the Internet back in the early 1990’s, information systems have become increasingly accessible by people across the globe.

Today, security is one of the highest priorities in most organisations and more and more home users are getting the message and becoming aware of the importance of information security.


Learn to keep information on your computer secure. A course equally important for the individual through to the largest corporation.
The most important security concepts related to information on the internet are confidentiality, integrity and availability, whereas the most important concepts related to the people using the information on the internet are authorisation, authentication and non-repudiation.

Read More

Lessons

Lesson Structure: Information Security BIT206

There are 11 lessons in this course:

  1. Introduction to Information Security
    • Need for Security
    • Basic Security Concepts
    • Security Breaches and Intrusions
    • Types of Threats
    • Threat Assessment
    • Vulnerability Assessment
    • Security through Obscurity
    • Hackers
    • Crackers
    • The Difference between Hackers and Crackers
    • IP Spoofing
    • Blind Spoofing
    • Man in the Middle Attack
    • Denial of Service
    • Distributed Denial of Service
    • Phishing
    • How to Defend against Spoofing
    • What is a Botnet
    • Types of bots and their Malicious Use
  2. Information Security Ethics
    • Ethical Issues facing IT Professionals
    • Legal Issues facing IT Professionals
    • Intellectual Property Rights
  3. Data Integrity and Backing up
    • What is Data Integrity
    • Protection
    • Detection
    • Correction
    • What is Data backup
    • Full backup
    • Incremental backup
    • Mirror backup
    • Offsite backup
    • Offsite versus Onsite Backup
    • Disk based versus Tape based Backup
    • Online backup
  4. Vulnerabilities of Operating Systems and Information Systems
    • What is Vulnerability
    • Operating Systems and Software Vulnerability
    • Running Virus Protection Software
    • Updating Security Patches for Software
    • Approved Software
    • FTP Vulnerability
    • Trojan Horses
    • Who is at Risk of Trojan Horses
    • Protection against Trojans
  5. Risk Management
    • What is Risk Management
    • Key Roles in the Risk Management Process
    • Risk Assessment
    • Characterising the System
    • Identifying Threats
    • Control Analysis
    • Determining Likelihood Ratings
    • Analyzing the Impact
    • Determining the Risks
    • Controls Recommendations
    • Risk Mitigation
    • Risk Evaluation
  6. Information Security Technologies, Developments and Initiatives
    • What is VPN (Virtual Private Network)
    • Features and Benefits of VPN
    • Components of Remote Access VPN
    • Protocols Used in VPN Connections
    • Advantages and Disadvantages of VPN
    • What is a Firewall
    • Main Functions of Firewalls
    • Packet Filtering
    • Circuit Relay
    • Application Gateway
    • Firewall Rules
    • What are Intrusion Detection Systems (IDS)
    • Types of IDS
    • IDS versus Firewalls
  7. Physical Security
    • What is Physical Security?
    • Natural Disasters and Controls
    • Lightning
    • Power Loss
    • Fire
    • Earthquake
    • Liquid Leakage
    • The Human Factor
    • Locks
    • Tokens
    • Challenge-response Tokens
    • Dumb Cards
    • Smart Cards
    • Biometric Devices
    • Fingerprint Scanners
    • Retnal Scan Devices
    • Palm Scan Devices
    • Hand Geometry Devices
    • Facial Recognition Devices
  8. Developing a security Policy
    • Introduction
    • Need for Security
    • Importance of Security Policy
    • Developing a Security Policy
  9. Implementing and revising a security policy
    • Introduction
    • Communicating the Security Policy
    • Enforcing the Security Policy
    • Assessing the Security Policy
    • Common Security Policies
    • Password Policy
    • Access Control Policy
    • Displaying a Warning Notice
    • Audit Policy
    • Server Security Policy
    • Automatically Forwarded Emailsa Policy
    • Information Sensitivity Policy
    • Anti Virus Policy
    • Remote Access Policy
    • Wireless Communication Policy
  10. Business Continuity and Disaster Recovery Planning
    • Difference between disaster recover and business continuity?
    • Disaster recovery plan
    • Business continuity plan
  11. Information Security Maintenance
    • Time Management
    • Networking
    • Management
    • Attitude
    • Procedures
    • Products and Services
    • The Law

Each lesson culminates in an assignment which is submitted to the school, marked by the school’s tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.

Scroll to Top

REQUEST A CALLBACK

To speak to one of our course advisors, please enter your name and phone number below and click the "Please Call Me" button. We will call you back as soon as possible!

By submitting this form, I provide my consent to ADL to contact me via email or telephone, regarding the course I selected. All information provided is protected in conformity with our Privacy Policy.

CONTACT US

required fields are marked with *

By submitting this form, I provide my consent to ADL to contact me via email or telephone, regarding the course I selected. All information provided is protected in conformity with our Privacy Policy.