àËÅöÊÓƵ

Skip to main content
MOOC

Cyber Security Fundamentals

Module information>

Application Deadlines

Ongoing

Programme Duration

3 weeks

Academic Direction
Royal Holloway, àËÅöÊÓƵ
Modes of Study
Online

Cyber Security is becoming increasingly familiar, as hardly a day goes by without media reports on the latest cyber-attack, whether it’s conducted by criminals or a hostile government. Cyber Security involves trying to reduce the likelihood of such attacks, however they originate and whatever their motivation.

About this course

In this course you will learn the fundamentals of cyber security - what it is, how we can define it, and how we can go about trying to improve the security properties of organisations, as well as our personal lives.

This course is intended to provide a general introduction to key concepts in cyber security. It is aimed at anyone with a good general knowledge of information and communications technology. The nature, scope and importance of cyber security are explained, and key concepts are justified and explored. This includes examining the types of threat that cyber security must address, as well as the range of mechanisms, both technological and procedural, that can be deployed.

The topics we cover will include:

  • The role of cryptography in providing security is explored, including how algorithms and keys play their part in enabling cyber security.
  • The key supporting function played by key management is identified, including why the use of cryptographic functions depends on it.
  • The need for security management in an organisation is explained, and its main elements are introduced - including the key role played by risk management.
  • The importance of standardised approaches to security management is explained, as is the notion of compliance.

By completing this course you will be able to explain the need for security management and key standards that need to be in place to make organisations more secure.

A professional working in cyber security
The role of cryptography in providing security is explored, including how algorithms and keys play their part in enabling cyber security.