In this technological age, we undertake an abundance of tasks online – in fact, sometimes computers, laptops and smartphones seem like extensions of ourselves! However, along with our usage comes the danger of information – from passwords and identities to documents and photos – being compromised. This course is ideal for those who would like to know more about digital information security, from individuals through to those working in the information technology sector.
The Certificate of Information Security is an online program that will help you recognise vulnerabilities, implement security and manage risks when it comes to protecting data.
In this professional development course, you will discover how to maintain data integrity, understand different types of threats, back up data, and undertake security initiatives, including managing a system’s physical security.
You will also learn how to develop and implement a security policy, develop business continuity and disaster recovery plan, and understand the legal and ethical issues facing IT professionals.
On completion of this course, you will have a broad understanding of information security and be able to implement solutions and initiatives to keep data (and the hardware that supports it!) safe.
Unit - Information Security
Unit 1 – Introduction to Information Security
Need for security
Basic security concepts
Security breaches and intrusions
Types of threats
Security through obscurity
The difference between hackers and crackers
Man in the middle attack
Denial of service
Distributed denial of service
How to defend against spoofing
What is a botnet
Types of bots and their malicious use
Unit 2 – Information security ethics
Ethical issues facing IT professionals
Legal issues facing IT professionals
Intellectual property rights
Unit 3 – Data integrity and backing up
What is data integrity
What is data backup
Offsite versus onsite backup
Disk based versus tape based backup
Unit 4 – Vulnerabilities of operating systems and information systems
What is vulnerability
Operating systems and software vulnerability
Running virus protection software
Updating security patches for software
Who is at risk of trojan horses
Protection against trojans
Unit 5 – Risk management
What is risk management
Key roles in the risk management process
Characterising the system
Determining likelihood ratings
Analyzing the impact
Determining the risks
Unit 6 – Information security technologies, developments and initiatives
What is VPN (Virtual Private Network)
Features and benefits of VPN
Components of remote access VPN
Protocols used in VPN connections
Advantages and disadvantages of VPN
What is a firewall
Main functions of firewalls
What are intrusion detection systems (IDS)
Types of IDS
IDS versus firewalls
Unit 7 – Physical security
What is physical security?
Natural disasters and controls
The human factor
Retinal scan devices
Palm scan devices
Hand geometry devices
Facial recognition devices
Unit 8 – Developing a security policy
Need for security
Importance of security policy
Developing a security policy
Unit 9 – Implementing and revising a security policy
Communicating the security policy
Enforcing the security policy
Assessing the security policy
Common security policies
Access control policy
Displaying a warning notice
Server security policy
Automatically forwarded emailsa policy
Information sensitivity policy
Anti virus policy
Remote access policy
Wireless communication policy
Unit 10 – Business continuity and disaster recovery planning
Difference between disaster recover and business continuity?
Disaster recovery plan
Business continuity plan
Unit 11 – Information security maintenance
Products and services
Estimated duration 50 hours
Course Delivery and Start
Start anytime, self-paced and 100% online
Assessment will be comprised of written exercises, including short-answer questions, reflective tasks, short reports and/or projects. There are no examinations or due dates for assessment. As a result, you can complete training in your own time and at your own pace with the assistance of unlimited tutor support.
Why Choose Australian Online Courses?
Professional development that is widely recognised and respected;
Improve your employment opportunities;
Study online, anywhere via our elearning system;
High-quality professional development programs written by industry experts;
All course materials provided online – no textbooks to buy;
Unlimited tutor support via email;
We offer twelve (12) months’ access, with extensions available upon application (fees apply);
Course may be tax deductible; see your tax advisor.
Are there any entry requirements or pre-requisites?
There are no entry requirements or pre-requisites for entry into this program.
How long will it take to complete this course?
The approximate study hours for this course is 50 hours. We offer twelve (12) months’ access, with extensions available upon application (fees apply).
Can I purchase optional printed materials?
While printed materials are not available for purchase, PDF copies are available for download and self-printing for this program.
When can I start this course?
You can start within 60 minutes during business hours when you enrol and pay in full with a credit card!
Credit card: Within 60 mins during business hours.
BPAY: Within 1-2 working days.
Internet Banking: Within 1-2 working days.
Cheque/Money Order: Upon receipt of mailed cheque.
Will I receive a certificate upon completion of this course?
Yes! You will receive a Certificate of Attainment upon successful completion of your assessment.
Do I need to attend classes or undertake any work placements?
No. All courses are delivered online via our e-learning system and there are no work placement requirements in this course.
What support can I expect from Australian Online Courses?
Unlimited tutor support is available throughout your studies via email during business hours Monday to Friday. Our Administrative team are available Monday to Friday via email, live chat and telephone.
I am an international student. Can I enrol into this course?
Yes! We accept enrolments from individuals both within Australia and internationally; location is no barrier to entry into our programs.