Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Information Security

Birla Institute Of Technology And Science–Pilani (BITS–Pilani) via Coursera

Overview

Why Pay Per Course When You Can Get All of Coursera for 40% Off?
10,000+ courses, Google, IBM & Meta certificates, one annual plan at 40% off. Upgrade now.
Get Full Access
The course "Information Security" aims to prepare you for a deeper understanding and application of information security principles and practices essential for today’s digital landscape. In this course, you’ll be introduced to the fundamental concepts of securing information systems, program security, database integrity, operating system protections, cloud security, and privacy frameworks. You’ll learn about various types of security threats, vulnerabilities, and defences, as well as the legal and ethical dimensions of cybersecurity. The course covers a wide variety of topics, from program-level safeguards to physical security and auditing practices. These topics are designed to give you an overview of critical areas within the field, serving as a foundation for further specialisation and research in your degree program. Whether you're interested in secure software design, cloud infrastructure security, or the evolving challenges in privacy and anonymity, this course offers a comprehensive starting point to build your expertise in cybersecurity.

Syllabus

  • Course Introduction
    • In this module, the learners will be introduced to the course and its syllabus, setting the foundation for their learning journey. The course's introductory video will provide them with insights into the valuable skills and knowledge they can expect to gain throughout the duration of this course. Additionally, the syllabus reading will comprehensively outline essential course components, including course values, assessment criteria, grading system, schedule, details of live sessions, and a recommended reading list that will enhance the learner’s understanding of the course concepts. Moreover, this module offers the learners the opportunity to connect with fellow learners as they participate in a discussion prompt designed to facilitate introductions and exchanges within the course community.
  • Introduction to Information Security
    • This module provides an overview of information security, covering its foundational concepts, evolution, key components, and importance in the digital age. It introduces the concepts of risks, vulnerabilities, threats, and the motivations of threat actors, laying the groundwork for understanding the modern cybersecurity landscape.
  • Access Control and Security Policies
    • This module delves into security policies and access control, which are crucial for managing and restricting access to sensitive information. Learners will explore various types of access control mechanisms and how these are enforced through policy frameworks. The module also discusses confidentiality, integrity, and hybrid policies, giving a foundational understanding of how organisations safeguard data against unauthorised use.
  • Security Mechanisms Based on OSI Stack
    • This module focuses on implementing security at different layers of the OSI model, from network to application. Learners will gain hands-on knowledge of security protocols such as IPSec, TLS/SSL, and secure application communication. The module also introduces real-world attack vectors and how to defend against them using layered security approaches.
  • Security and Network Defenses
    • This module explores various network defenses and system-level protections, including intrusion detection/prevention systems, firewalls, and secure OS configurations. Learners will also explore secure software development practices, physical infrastructure security, and the role of human factors in cybersecurity.
  • Threat Modelling and Incident Management
    • This module introduces learners to threat modelling techniques and frameworks such as attack trees and the cyber kill chain. It also covers attack classification databases (CAPEC, CVE, CVSS), incident response procedures, and the legal and ethical dimensions of cybersecurity. The module culminates in a staff-graded assessment for applied learning.
  • Classical Encryption Techniques
    • This module provides a foundational understanding of information security, its key components, and the evolution of encryption techniques. It introduces the classical encryption techniques like substitution and Caesar ciphers, and the mathematical foundations behind these methods.
  • Confidentiality - 1 (Symmetric)
    • This module introduces encryption fundamentals, focusing on public and private key cryptographic techniques. It explores the differences between symmetric and asymmetric encryption, the working mechanisms of stream and block ciphers, and their practical applications in modern security.
  • Confidentiality-2 (Symmetric)
    • This module delves into asymmetric encryption techniques. It covers RSA and Diffie-Hellman algorithms, block cipher modes of operation, and challenges in modern cryptography, including quantum threats. Learners will explore how these techniques are applied in real-world systems and examine the trade-offs between security, performance, and scalability.
  • Confidentiality-3 (Asymmetric)
    • This module introduces asymmetric cryptography, focusing on the RSA algorithm and key establishment techniques such as Diffie-Hellman Key Exchange (DHKE). It highlights how asymmetric methods ensure data confidentiality and support secure communication.
  • Integrity and Availability
    • This module covers the concepts of data integrity and authentication, focusing on hash functions and Message Authentication Codes (MACs). It explains how these cryptographic tools are used to verify the integrity and authenticity of information.
  • Final Comprehensive Examination
    • Final Comprehensive Examination

Taught by

Rajesh Kumar and Prof. Hemant Rathore

Tags

Reviews

Start your review of Information Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.