This course explores the principles and practices of preserving and securing library and information systems and resources. It covers methods for preserving various types of library materials, including print and digital resources. Topics include environmental control, disaster planning, information security, and risk assessment. Students will learn about policies, standards, and techniques for ensuring the longevity and accessibility of library collections, as well as strategies for mitigating threats and vulnerabilities.
Take a practice test or generate AI study notes to help you excel in this course.
Everything you need to know about this course
Key areas covered in this course
No specific requirements needed
This course is designed to be accessible to all students. You can start immediately without any prior knowledge or specific preparation.
How your progress will be evaluated (6 methods)
Comprehensive evaluation of course material understanding
Comprehensive evaluation of course material understanding
Comprehensive evaluation of course material understanding
Team-based learning and peer interaction
Extended work showcasing practical application of skills
Comprehensive evaluation of course material understanding
Explore the career paths this course opens up for you
Apply your skills in this growing field
Apply your skills in this growing field
Apply your skills in this growing field
Apply your skills in this growing field
Apply your skills in this growing field
Real-world sectors where you can apply your knowledge
A structured 13-week journey through the course content
This study schedule is in beta and may not be accurate. Please use it as a guide and consult the course outline for the most accurate information.
Expert tips to help you succeed in this course
Create detailed notes for each unit, focusing on key definitions and concepts.
Practice applying preservation and security techniques through case studies.
Review policies and standards related to preservation and security.
Develop a disaster management plan outline for a hypothetical library.
Focus on understanding the CIA triad (Confidentiality, Integrity, Availability) and its application.
Create concept maps linking Units 3-5 information security concepts
Practice SQL queries from Units 7-9 weekly
Review all TMA questions and answers
Allocate specific time slots for focused study sessions each week
Form a study group to discuss challenging topics and share insights
Other courses in Education that complement your learning