In this technological age, we undertake an abundance of tasks online – in fact, sometimes computers, laptops and smartphones seem like extensions of ourselves! However, along with our usage comes the danger of information – from passwords and identities to documents and photos – being compromised. This course is ideal for those who would like to know more about digital information security, from individuals through to those working in the information technology sector.
Introduction to Information Security is an online professional development program that will help you recognise vulnerabilities, implement security and manage risks when it comes to protecting data.
In this information security course, you will discover how to maintain data integrity, understand different types of threats, back up data, and undertake security initiatives, including managing a system’s physical security.
You will also learn how to develop and implement a security policy, develop business continuity and disaster recovery plan, and understand the legal and ethical issues facing IT professionals.
On completion of this course, you will have a broad understanding of information security and be able to implement solutions and initiatives to keep data (and the hardware that supports it!) safe.
Course Structure
Unit - Information Security
Unit 1 – Introduction to Information Security
- Need for security
- Basic security concepts
- Security breaches and intrusions
- Types of threats
- Threat assessment
- Vulnerability assessment
- Security through obscurity
- Hackers
- Crackers
- The difference between hackers and crackers
- Ip spoofing
- Blind spoofing
- Man in the middle attack
- Denial of service
- Distributed denial of service
- Phishing
- How to defend against spoofing
- What is a botnet
- Types of bots and their malicious use
Unit 2 – Information Security Ethics
- Ethical issues facing IT professionals
- Legal issues facing IT professionals
- Intellectual property rights
Unit 3 – Data Integrity and Backing Up
- What is data integrity
- Protection
- Detection
- Correction
- What is data backup
- Full backup
- Incremental backup
- Mirror backup
- Offsite backup
- Offsite versus onsite backup
- Disk based versus tape based backup
- Online backup
Unit 4 – Vulnerabilities of Operating Systems and Information Systems
- What is vulnerability
- Operating systems and software vulnerability
- Running virus protection software
- Updating security patches for software
- Approved software
- Ftp vulnerability
- Trojan horses
- Who is at risk of trojan horses
- Protection against trojans
Unit 5 – Risk Management
- What is risk management
- Key roles in the risk management process
- Risk assessment
- Characterising the system
- Identifying threats
- Control analysis
- Determining likelihood ratings
- Analyzing the impact
- Determining the risks
- Controls recommendations
- Risk mitigation
- Risk evaluation
Unit 6 – Information Security Technologies, Developments and Initiatives
- What is VPN (Virtual Private Network)
- Features and benefits of VPN
- Components of remote access VPN
- Protocols used in VPN connections
- Advantages and disadvantages of VPN
- What is a firewall
- Main functions of firewalls
- Packet filtering
- Circuit relay
- Application gateway
- Firewall rules
- What are intrusion detection systems (IDS)
- Types of IDS
- IDS versus firewalls
Unit 7 – Physical Security
- What is physical security?
- Natural disasters and controls
- Lightning
- Power loss
- Fire
- Earthquake
- Liquid leakage
- The human factor
- Locks
- Tokens
- Challenge-response tokens
- Dumb cards
- Smart cards
- Biometric devices
- Fingerprint scanners
- Retinal scan devices
- Palm scan devices
- Hand geometry devices
- Facial recognition devices
Unit 8 – Developing a Security Policy
- Introduction
- Need for security
- Importance of security policy
- Developing a security policy
Unit 9 – Implementing and Revising a Security Policy
- Introduction
- Communicating the security policy
- Enforcing the security policy
- Assessing the security policy
- Common security policies
- Password policy
- Access control policy
- Displaying a warning notice
- Audit policy
- Server security policy
- Automatically forwarded emailsa policy
- Information sensitivity policy
- Anti virus policy
- Remote access policy
- Wireless communication policy
Unit 10 – Business Continuity and Disaster Recovery Planning
- Difference between disaster recover and business continuity?
- Disaster recovery plan
- Business continuity plan
Unit 11 – Information Security Maintenance
- Time management
- Networking
- Management
- Attitude
- Procedures
- Products and services
- The law
Study Hours
Estimated duration 50 hours
Course Delivery and Start
Start anytime, self-paced and 100% online
Assessment
Assessment will be comprised of written exercises, including short-answer questions, reflective tasks, short reports and/or projects. There are no examinations or due dates for assessment. As a result, you can complete training in your own time and at your own pace with the assistance of unlimited tutor support.
Testimonials
About Us
Graduation
A Certificate of Attainment and Statement of Results will be issued upon successful completion of this course.
How to Enrol
Enrol Online: Enrol Now
Enrol via Live Chat (Business Hours)
Enrol via Telephone 1300 76 2221 (Business Hours)
Enrol via Purchase Order/Tax Invoice
Enrolling Multiple Staff?
To enrol multiple staff, please complete the Employer Enrolment Form. We’ll be in touch within 60 minutes during business hours!
Payment Options
Visa, Mastercard, BPAY and EFT/Direct Deposit. Please allow 1-2 Business days for processing for EFT and BPAY.
Course FAQs
Why Choose Australian Online Courses?
- Professional development that is widely recognised and respected;
- Improve your employment opportunities;
- Study online, anywhere via our elearning system;
- High-quality professional development programs written by industry experts;
- All course materials provided online – no textbooks to buy;
- Unlimited tutor support via email;
- We offer twelve (12) months’ access, with extensions available upon application (fees apply);
- Course may be tax deductible; see your tax advisor.
Are there any entry requirements or pre-requisites?
There are no course or subject pre-requisites for entry into our programs. However, our professional development programs are generally intended for people over the age of 18. In some circumstances, enrolments from younger people may be considered. Please complete the AOC Parent Guardian Consent Form prior to enrolling and submit here.
Are there any computer requirements?
To study online with Australian Online Courses you will need a computer (desktop PC/laptop) running a current/updated operating system with reliable high-speed internet access. You will need to use the Google Chrome browser to access your course.
When can I start this course?
You can start within 60 minutes during business hours when you enrol and pay in full with a credit card!
Credit card: Within 60 mins during business hours.
BPAY: Within 1-2 working days.
Internet Banking: Within 1-2 working days.
Cheque/Money Order: Upon receipt of mailed cheque.
How is this course delivered?
This course is delivered online via our easy-to-navigate Learning Management System (LMS), where you will discover interactive online learning/written content, resources and assessment.
Do I need to attend classes or undertake any work placements?
No. All courses are delivered online via our LMS and there are no work placement requirements in this course.
What support can I expect from Australian Online Courses?
Unlimited tutor support is available throughout your studies via email only during business hours Monday to Friday. Our Administrative team are available Monday to Friday via email, live chat and telephone.
I am an international student. Can I enrol into this course?
Yes! We accept enrolments from individuals both within Australia and internationally; location is no barrier to entry into our programs.
Career Pathways
Future growth
Strong
Unemployment
Low
Professional Development for:
- Security Administrators
- Security Consultants
- Security Analysts