Overview
With this Information Security course from Warnborough College you will learn:
- To keep information from your computer secure
- The need for security and the different ways it can be compromised
- About data integrity and how it can be backed up safely
- The vulnerabilities of different Operating Systems and how they are exploited
- Understand the need for security policies, planning and implementation of recovery plans
Potential Threats
IP Spoofing
IP Spoofing is when people try to unlawfully access a cumputer or information system, like a server, using an IP address of a trusted host.
Non-Blind Spoofing
Non-blind spoofing is simular to IP Spoofing but it requires both the attacker (hacker) and the victim to be on the exact same subnet.
Blind Spoofing
Blind spoofing is a type of sophisticated IP spoofing attack whereby the attacker needs to sample the sequence numbers because the sequence number and the acknowledgment numbers are unreachable. To do so, the attacker will need to send many packets to the target computer and attempt to sample sequence numbers.
“Man in the Middle” attack
A man in the middle attack (also called “MITM attack”) is a term used to refer to both blind spoofing and non-blind spoofing attacks. A man in the middle attack occurs when a malicious party intercepts a communication between 2 legitimate parties. By doing so, the intruder will be able to view, modify, or delete information flowing between the 2 parties without being noticed by the sender or the receiver.
Phishing
Phishing is term used in the world of information security; it refers to a fraudulent attempt to steal a user’s personal information (such as usernames, passwords, date of birth, credit card numbers, bank account logins and passwords, etc.). The main purpose of phishing is to steal money form users, whether from their emails, phone calls, or websites logins (such as internet banking logins).
Programme Structure
Lessons:
- Information Security Ethics
- Data Integrity and Backing up
- Vulnerabilities of Operating Systems and Information Systems
- Risk Management
- Information Security Technologies, Developments and Initiatives
- Physical Security
- Developing a Security Policy
- Implementing and revising a security policy
- Business Continuity and Disaster Recovery Planning
- Information Security Maintenance
Key information
Duration
- Part-time
- 4 days
Start dates & application deadlines
- You can start the course whenever is convenient for you.
Language
Delivered
- Self-paced
Disciplines
Information Technology (IT) Computer Sciences View 121 other Short Courses in Computer Sciences in United KingdomAcademic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
We are not aware of any English requirements for this programme.
Tuition Fee
-
International
395 GBP/fullTuition FeeBased on the tuition of 395 GBP for the full programme during 4 days. -
National
395 GBP/fullTuition FeeBased on the tuition of 395 GBP for the full programme during 4 days.