Skip to main content
CSS747Social Sciences3 Unitsintermediate

Technical/ Electronic Aspects Of Security

This course introduces the technical and electronic aspects of security, covering e-security concepts, electronic risks, and security measures in emerging markets. It explores risk management frameworks, policy responses, and the use of hand and powered tools in security. Students will examine electronic banking security, data interchange security, and the role of CCTV systems. The course also delves into engineering concepts, information security economics, and relevant legislation, preparing students to analyze and address modern security challenges.

Take a practice test or generate AI study notes to help you excel in this course.

120h
Study Time
13
Weeks
9h
Per Week
basic
Math Level
Course Keywords
E-SecurityElectronic RisksCCTVEDI SecurityRisk Management

Course Overview

Everything you need to know about this course

Course Difficulty

Intermediate Level
Builds on foundational knowledge
65%
intermediate
Math Level
Basic Math
🔬
Learning Type
Hands-on Practice

Course Topics

Key areas covered in this course

1

E-security

2

Electronic Crime

3

Electronic Banking

4

CCTV Systems

5

Information Security

6

E-Voting

Total Topics6 topics

Ready to Start

No specific requirements needed

This course is designed to be accessible to all students. You can start immediately without any prior knowledge or specific preparation.

Assessment Methods

How your progress will be evaluated (3 methods)

assignments

Comprehensive evaluation of course material understanding

Written Assessment

tutor-marked assignments

Comprehensive evaluation of course material understanding

Written Assessment

final examination

Comprehensive evaluation of course material understanding

Written Assessment

Career Opportunities

Explore the career paths this course opens up for you

Security Analyst

Apply your skills in this growing field

IT Security Officer

Apply your skills in this growing field

Surveillance Operator

Apply your skills in this growing field

Security Consultant

Apply your skills in this growing field

Network Administrator

Apply your skills in this growing field

Industry Applications

Real-world sectors where you can apply your knowledge

BankingGovernmentRetailTelecommunicationsTransportation

Study Schedule Beta

A structured 13-week journey through the course content

Week
1

Module 1: Introduction to E-Security

2h

Unit 1: Introduction to E-Security

2 study hours
  • Define e-security and related concepts
  • Identify public policy frameworks to improve electronic safety
Week
2

Module 1: Introduction to E-Security

4h

Unit 2: Electronic Risks

2 study hours
  • Understand and explain electronic risk
  • Explain the need to study its implication in a globalising world
  • Identify various risks associated with electronic transactions

Unit 3: E-security in Emerging Markets

2 study hours
  • Existing barriers in emerging economies as they affect security matters
  • The ways and manner these barriers can be curbed or managed
  • Some attributes of some selected countries
Week
3

Module 1: Introduction to E-Security

2h

Unit 4: Risk Management Framework

2 study hours
  • Public interest in assuring e-security
  • Why the right form of regulation is needed
Week
4

Module 1: Introduction to E-Security

2h

Unit 5: Tradeoffs: Security, Quality of Service, Privacy, Technological Innovation, and Costs

2 study hours
  • Investigate the various essentials in security, from costs, quality of services, technology innovation and privacy
Week
5

Module 2:

2h

Unit 1: Policy Response: Overview of the Four Pillars

2 study hours
  • Examine the four pillars involved in the building of policy framework and practice of electronic security
Week
6

Module 2:

4h

Unit 2: Security of Payment Systems

2 study hours
  • Examine The potential risks associated with e-transactions

Unit 3: Hand and powered tools in security

2 study hours
  • Understand the security and hazards hand and powered tools can create in the work environment
Week
7

Module 2:

4h

Unit 4: Electronic Document Security

2 study hours
  • Provide the reader with a brief overview of relevant document security issues and technologies, as well as to introduce the Adobe suite of document security solutions

Unit 5: Electronic Security: Protecting Your Resources

2 study hours
  • Describe some of the threats your organization faces when it provides Internet access to its members
Week
8

Module 3:

2h

Unit 1: Electronic Voting System

2 study hours
  • Bring to the fore the importance of electronic system of voting in this century
  • Examine the relationship between e-voting and free election in advanced and developing nations
Week
9

Module 3:

2h

Unit 2: Security Analysis of Remote E-Voting

2 study hours
  • Analyze security considerations for a remote Internet voting system based on the system architecture of remote Internet voting
Week
10

Module 3:

2h

Unit 3: The Security of Electronic Banking

2 study hours
  • Discuss the motivations and ventures in Electronic Banking
  • Address the disastrous ventures in Electronic Banking with an example
  • Look into the concerns about Electronic Banking from various perspectives as well as germane security issues and attacks
Week
11

Module 3:

4h

Unit 4: Security Solutions To Electronic Banking

2 study hours
  • Examine some solutions on how best to tackle the numerous problems hindering electronic banking system worldwide

Unit 5: Electronic Data Interchange (EDI) Messaging Security

2 study hours
  • Looks at a particularly important aspect of EDI — the security of EDI messages
Week
12

Module 4:

2h

Unit 1: Converting an Analog CCTV System to IP-Surveillance

2 study hours
  • Provide a guide for the end user who is interested in making the transition from a current analog system to a digital one
Week
13

Module 4:

2h

Unit 2: Closed Circuit Television and the Role of Security Operatives in Surveillance and Intelligence Gathering

2 study hours
  • Identify and define the context of key words: Security operatives, Surveillance, Intelligence gathering, Closed circuit television CCTV and the role of the Nigeria Security and Civil Defence Corp in the application of electronic gadgets

This study schedule is in beta and may not be accurate. Please use it as a guide and consult the course outline for the most accurate information.

Course PDF Material

Read the complete course material as provided by NOUN.

Access PDF Material

Study Tips & Exam Preparation

Expert tips to help you succeed in this course

1

Create concept maps linking Modules 1-2 e-security concepts

2

Practice analyzing electronic risk scenarios from Units 2-3 weekly

3

Review CCTV surveillance techniques from Module 4 Units 1-2

4

Study EDI messaging security protocols from Module 3 Unit 5

5

Focus on key definitions and frameworks from each unit

Related Courses

Other courses in Social Sciences that complement your learning