Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
Topic Outcomes
About this Course
Written by fellow teachers, this course guides you through the steps and details of computer security. The engaging interactive lessons cover topics ranging from a general introduction of computer security and more. Contact our Instructor with any learning questions.
Course Synopsis
Computer security in the corporate setting fills the critical need for security education. Its comprehensive, balanced, and well-organized presentation emphasizes implementing security within corporations using existing commercial software and provides coverage of all major security issues. This course introduces from the basic of computer security, authentication, cryptography and key security management issues such as threats and attacks.
Transferable Skills
How it Works
Through interactive easy-to-understand text lessons, this course will provide you with both an overview of computer security and cover specific topics you may encounter as you work on through your own learning. Each lesson and its corresponding activities can also be accessed on any mobile device, at any time.
This course includes:
How to Pass
You have to complete all the learning activities and assignments, and sit for the online final examination. Assessments will be given to evaluate whether you have achieved the Course Learning Outcomes. You are able to download with a Certificate of Completion upon finishing all the learning materials. Certificate of Achievement is also available to be download upon passing all the assessments. The examination will be conducted at a scheduled time and date.
Credit Earn
Earning and transferring credit to the Bachelor of ICT under School of Science and Technology at AeU.
*Applicants must fulfill the standard entry requirements and course credit transfer eligibility criteria for each programmes.
1 - Describe the provision of computer security in safeguarding the information systems. |
2 - Interpret issues that arise in devising practical solutions to management of computer security for information system requirements. |
3 - Propose and communicate the infrastructure by applying prevention and technical defences for a real situation. |
4 - Model the real world problem using risk analysis, risk management and risk assessment using knowledge representation and problem solving techniques. |
5 - Propose and organize using team skills strategy to produce best ideas that high technology, classical security practice, and common sense have to offer in reducing insecurity to the lowest possible level. |
Completion of:
Completion of: