Computer Security

4 Weeks Information and Communication Te Course Credit : 3
Micro-Credentials Language of Delivery : English
Share on  
  • 1 - Fundamental of Computer Security
    This topic discusses the brief history of computer security and its important. In order to implement the computer security, it is very important for organizations to properly develop and established their policies, procedures, standards and guidelines to maintain the security of the systems and network

    Topic Outcomes

    1. Define the meaning of security in computer systems.
    2. Determine security problems associated with computer systems.
    3. Explain the general computer security framework concepts.
    4. Identify the trends and issues in computer security.
  • 2 - Authentication and Basic Cryptography
    This topic covers the important of an authentication process. An authentication is related to the scenario where some party (claimant) has presented a principal's identity and claims to be that principal. Authentication enables some other party (verifier) to gain confidence that the claim is legitimate.

    Topic Outcomes

    1. Understand the mechanisms of authentication.
    2. Determine and choose a good password to authenticate authorized user.
    3. Understand the concept of cryptography and the algorithms used in cryptography.
    4. Identify the cryptography attacks
  • 3 - Threats and Vulnerabilities
    Computer vulnerability is a weakness in an operating system, application code, or configuration that makes it possible for threats to exploit the system (or underlying network) thereby creating negative impact or damage. Threats are entities that act upon vulnerabilities for the purpose of trying to exploit it. A threat may be an unauthorized user such as a hacker, or even a system administrator trying to obtain access above and beyond their authorized level of privilege.

    Topic Outcomes

    1. Define the meaning of computer criminals and psychology in computer systems.
    2. Define the meaning of information warfare and computer penetration.
    3. Determine the attacker involve in information warfare and computer penetration.
    4. Determine malicious code and denial attacks associated with computer systems.
    5. Explain the malicious code concepts.
    6. Identify the physical threats in computer security.
  • 4 - Prevention and Technical Defenses
    This topic discusses about the important of protecting infrastructure from disaster especially for industry, government and society. Yet with more activities dependent on computer networks - from banking and aviation to emergency services - the reliability and security of information and communication systems against disasters, both natural and man-made, are in doubt.

    Topic Outcomes

    1. Define the meaning of information infrastructure.
    2. Identify the risk and threats of information infrastructure and steps to overcome the risks.
    3. Understand the prevention and technical defence of OS security, LAN, Firewalls and Antivirus Technology.
    4. Explain the piracy and anti-piracy techniques.
    5. Identify the anti-piracy techniques.
  • 5 - Detection
    This topic discusses the important of rapid detection and appropriate notification of any security strategy. Intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Without proper detection, you may never be aware that a security incident has occurred and thereby continue to use corrupt information to make business decision.

    Topic Outcomes

    1. Define the meaning of vulnerability and intrusion detection.
    2. Identify the cause of the vulnerability.
    3. Explain the different types of Intrusion Detection Systems.
    4. Identify the usage of monitor and control in detection system.
    5. Understand the usage of application control
  • 6 - Social Engineering
    This topic discusses about the responsibilities of a security professional in today’s ever-changing world, it is important to be familiar with Social Engineering techniques and the counter-measures available to reduce the likelihood of success. By having this knowledge, one can ensure appropriate the preventative, detective and corrective measures are implemented to protect the staff and assets of an organization.

    Topic Outcomes

    1. Understand the social engineering concept.
    2. Identify the social engineering types and methods.
    3. Determine the prevention method from social engineering attacks.
    4. Differentiate the data classification and marking.
    5. Discuss the relationship between layer of responsibility, data classification and social engineering
  • 7 - Human Factors
    This topic discusses about the implementation of right IT security concept where it can assist users in building a solid basis for a level of IT security that users can rely on. IT security plays a vital role in securing the information assets of organizations and businesses especially in today’s global war against terrorism. Thus, the IT security policy, guidelines or procedures, and standards are designed to help organization with this, providing a compact overview of the most relevant security safeguards Standardization of IT security is the work of international standard bodies such as the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

    Topic Outcomes

    1. Identify the security standard, policy and guideline for best practice.
    2. Determine the risk management process and the role of risk management team.
    3. Explain the ethical issues in computer security and the rights of the employee/employer.
    4. Examine the importance of security awareness.
    5. Conduct the security audit and control
  • 8 - Risk Management
    Risk management can best be described as a decision making process. Industry best practices clearly indicate that an important aspect of effectively managing risk is to consider it an ongoing process. Effective risk management avoids costly over-sights and unexpected problems.

    Topic Outcomes

    1. Identify the risk and the risk impact.
    2. Explain the purpose of risk management.
    3. Describe an approach to effectively manage risk.
    4. Determine the qualitative and quantitative risk assessment.
    5. Describe various tools related to risk management
  • 9 - Implementation (Delivery) Options
    It discusses about the Security Assurance where it is critical for determining trust worthiness of systems. Different levels of assurance arise, from informal evidence to rigorous mathematical evidence. Assurance needed at all stages of system life cycle and building security in is more effective than adding it later.

    Topic Outcomes

    1. Define the meaning of security technology.
    2. Identify the tool and it usage for security.
    3. Explain the assurance and trust in relation to confidence mechanism.
    4. Identify the usage WRMS in protecting information.
    5. Identify the step to overcome the compliance issue

About this Course

Written by fellow teachers, this course guides you through the steps and details of computer security. The engaging interactive lessons cover topics ranging from a general introduction of computer security and more. Contact our Instructor with any learning questions.

 

Course Synopsis

Computer security in the corporate setting fills the critical need for security education. Its comprehensive, balanced, and well-organized presentation emphasizes implementing security within corporations using existing commercial software and provides coverage of all major security issues. This course introduces from the basic of computer security, authentication, cryptography and key security management issues such as threats and attacks.

 

Transferable Skills

  1. Cognitive Skills
  2. Personal Skills
  3. Entrepreneur Skills
  4. Communication Skills
  5. Ethics and Professionalism

 

How it Works

Through interactive easy-to-understand text lessons, this course will provide you with both an overview of computer security and cover specific topics you may encounter as you work on through your own learning. Each lesson and its corresponding activities can also be accessed on any mobile device, at any time.

 

This course includes:

  • A topic sequence and assessment for this course can be accessed on any device, at any time within the learning duration.
  • Self Reflection and learning activities on each topic enabling you to check on your understanding of the course before moving further into it. 
  • A final exam allowing you to test your comprehension. 

 

How to Pass

You have to complete all the learning activities and assignments, and sit for the online final examination.  Assessments will be given to evaluate whether you have achieved the Course Learning Outcomes. You are able to download with a Certificate of Completion upon finishing all the learning materials. Certificate of Achievement is also available to be download upon passing all the assessments. The examination will be conducted at a scheduled time and date.

 

Credit Earn

Earning and transferring credit to the Bachelor of ICT under School of Science and Technology at AeU.

*Applicants must fulfill the standard entry requirements and course credit transfer eligibility criteria for each programmes.

1 - Describe the provision of computer security in safeguarding the information systems.
2 - Interpret issues that arise in devising practical solutions to management of computer security for information system requirements.
3 - Propose and communicate the infrastructure by applying prevention and technical defences for a real situation.
4 - Model the real world problem using risk analysis, risk management and risk assessment using knowledge representation and problem solving techniques.
5 - Propose and organize using team skills strategy to produce best ideas that high technology, classical security practice, and common sense have to offer in reducing insecurity to the lowest possible level.

Ts. Dr. Amna Saad

Designation : Academic Facilitator


Education

  • Doctor of Philosophy (Ph.D.) (Computer Science), Loughborough University, UK
  • Master of Science (Computer Science),UKM, Malaysia
  • Bachelor of Science (Computer Science) (Hons.), Loughborough University, UK

About the Instructor

  • Dr. Amna Saad is an established teacher and researcher in computer science and networking. Her research interests include expert system, big data and cloud computing, network performances, real time and embedded systems, Security and E-learning and cloud education. Dr. Amna is a certified Cisco Networking Academy Instructor. She taught courses like Voice Over IP, Multilayer Switching, Remote Access Network and CCNA. She also taught Research Methodology course for undergraduate students.  
  • She worked as an Application Development Manager, Value Added Network Services, Enterprise Network Solutions, COINS, Telekom Malaysia (TM) Berhad, before she joined Universiti Kuala Lumpur in 2003. "

You are required to complete all the learning activities provided in this course. Assessments are given to evaluate your achievement of the Course Learning Outcomes. You are able to download a Certificate of Achievement/Certificate of Completion upon completion of all requisite learning materials and passing the prescribed assessments.
  • 1 - Certificate of Achievement


    Completion of:

    • Course notes/readings
    • Formal course assessment- Multiple Choice Questions/Self assessment 
  • 2 - Certificate of Completion

    Completion of:

    • Course notes/readings 
    • Course learning activities
  • 3 - Malaysian Microcredential Statement (MMS)
    • Malaysian Microcredential Statement (MMS)

Join Now

RM 535.00

What’s included

  • 9 Topics
  • Certificate
  • 5 Learning Outcomes
  • Instructor-Led
  • 4 Weeks Duration