Table of Contents
Week 1: Introduction to Information Security
Week 2: The Need for Security
-
- Visit The Motherlist Glossary Of Cybersecurity And Cybercrime Definitions and read the first item under the Motherlist.
- Watch Cybercrime: Online scams
Week 3 – 4: Legal, Ethical, and Professional Issues in Information Security
-
- Read “ITS Security Policies”
- Watch “You Are the Product: Targeted by Cambridge Analytica on Facebook”
- Free access to New York times
- Read “Privacy versus Security”
- Read and try the tool of “Cover Your Track”
- Watch Cybercrime: Mass surveillance
Week 5 – 6: Risk Management
-
- Read S. Government Accountability Office: “Information Security Practices of Leading Organizations“
- Read Risk Management for Novel Coronavirus (COVID-19)
- Read the week 8 materials – Managing security risks
Week 7: Physical Security
Week 8 – 9: Cryptography I
Week 10 – 12: Cryptography II & III
-
- Read section 1 to section 3 from Gary C. Kessler’s “An Overview of Cryptography: Public-Key Cryptography“
- Read “RSA Cryptography: The Algorithm Keeping Us Safe Online”
- Read RSA Algorithm in Cryptography
- Read the Diffie-Hellman algorithm
- Hands-on exercise with the CrypTool