Course Description
In “Information Security: Integrity,” you will explore the critical principles of data integrity, focusing on maintaining data accuracy, completeness, and consistency. You will also examine various error detection and correction techniques, such as parity checks, redundancy methods, and error-correcting codes. The second module, “Information Security: Confidentiality,” covers the threats to data confidentiality and the role of cryptography in safeguarding sensitive information. This module highlights key encryption methods and their applications in securing data. In the third module, “Information Security: Availability,” you will learn about strategies for maintaining system and data availability, including fault tolerance, redundancy, and effective incident response planning—vital concepts in industries where data reliability is essential.
Who Will Benefit
Cybersecurity professionals, IT managers, system administrators, and compliance officers responsible for safeguarding organizational data. It is particularly beneficial for individuals involved in maintaining data integrity, confidentiality, and availability in industries where data reliability and security are critical.
Course Syllabus
Information Security - Introduction
Information Security: Integrity
Information Security: Confidentiality
Information Security: Availability
Information Security - Summary and Assessment
Additional Information
Supported Operating Systems: Microsoft 8 (or higher version)
Supported Mobile Operating Systems: iOS 11 (or higher version), Android 7.0 (or higher version)
Supported Desktop Browsers: Microsoft Edge, Mozilla Firefox, Google Chrome, Safari
Browser settings: JavaScript, Cookies, and Local Storage must be enabled + TLS Version 1.2
Overview
90 days from first access
English
Yes
Suggested for You