Cybercrime universally causes harm to individuals, subject matter experts (SMEs), primes, critical infrastructure systems, and governments. As we live in the Internet era, devices connected to the Internet can be exposed to cyber threats. Cyber assurance is vital for business continuity, security of our business processes, supply chain systems and data systems.
Cyber security is a collection of methods used to protect the integrity of network components, applications, and data from unauthorised access, alteration, or deletion. Enterprises use both cyber security and physical security to protect against unauthorised access to data centres and other computerised systems.
In this course, you will learn about cyber security practices and technologies to safeguard digital assets. Throughout the course, you will learn cyber security concepts, security design principles, concepts of risk-based cyber security, cryptography, principles of authentication, network security, cyber threats and mitigations strategies and legal/ethical aspects.
Learning outcomes:
- Describe cyber security hygiene concepts for risk based cyber assurance.
- Explain cryptography and security protocols and their roles in securing the data communication and authenticating the users.
- Identify and evaluate attack prevention and protection methods to safeguard networks and enterprise systems applications.
- Describe the design of secure systems for large enterprise applications.
- Apply state-of-the-art cyber security tools to safeguard information systems.
- Outline legal and ethical considerations for cybercrime, intellectual property, and computer ethics.