This course introduces students to information gathering, technology security, access and control, methodology, and ethics in computer operations security. It explores Information Security Integration and models, Information Assurance into System Administration, Management Information Systems Useability and Associated Risk. The course also covers modern safety practices, warning signs in mitigating associated security threats, and various information systems assessments, risk options, and models.
Transform this course into personalized study materials with AI
Everything you need to know about this course
Key areas covered in this course
No specific requirements needed
This course is designed to be accessible to all students. You can start immediately without any prior knowledge or specific preparation.
How your progress will be evaluated (3 methods)
Comprehensive evaluation of course material understanding
Comprehensive evaluation of course material understanding
Comprehensive evaluation of course material understanding
Explore the career paths this course opens up for you
Apply your skills in this growing field
Apply your skills in this growing field
Apply your skills in this growing field
Apply your skills in this growing field
Apply your skills in this growing field
Real-world sectors where you can apply your knowledge
A structured 13-week journey through the course content
This study schedule is in beta and may not be accurate. Please use it as a guide and consult the course outline for the most accurate information.
Expert tips to help you succeed in this course
Create concept maps linking Units 1-3 information gathering techniques.
Practice data flow diagramming from Unit 1 weekly.
Review the CIA triad (Confidentiality, Integrity, Availability) from Unit 2 and apply it to different scenarios.
Study the phases of system development life cycle from Unit 3 and their importance.
Focus on the ethical considerations in ICT from Unit 6, particularly privacy and security.
Understand the different risk mitigation options from Module 3 and their applications.
Review all TMAs and tutor feedback to identify areas of weakness.
Other courses in Social Sciences that complement your learning