Information Security

Study information security online. Learn to keep your computer secure.

Course Code: BIT203
Fee Code: S2
Duration (approx) Duration (approx) 100 hours
Qualification Statement of Attainment
Get started!

Learn to keep information on your computer secure.
  • A course equally important for the individual through to the largest corporation

The most important security concepts related to information on the internet are confidentiality, integrity and availability, whereas the most important concepts related to the people using the information on the internet are authorisation, authentication and non-repudiation.

Learn about Information Security

 

Lesson Structure

There are 11 lessons in this course:

  1. Introduction to Information Security
    • Need for Security
    • Basic Security Concepts
    • Security Breaches and Intrusions
    • Types of Threats
    • Threat Assessment
    • Vulnerability Assessment
    • Security through Obscurity
    • Hackers
    • Crackers
    • The Difference between Hackers and Crackers
    • IP Spoofing
    • Blind Spoofing
    • Man in the Middle Attack
    • Denial of Service
    • Distributed Denial of Service
    • Phishing
    • How to Defend against Spoofing
    • What is a Botnet
    • Types of bots and their Malicious Use
  2. Information Security Ethics
    • Ethical Issues facing IT Professionals
    • Legal Issues facing IT Professionals
    • Intellectual Property Rights
  3. Data Integrity and Backing up
    • What is Data Integrity
    • Protection
    • Detection
    • Correction
    • What is Data backup
    • Full backup
    • Incremental backup
    • Mirror backup
    • Offsite backup
    • Offsite versus Onsite Backup
    • Disk based versus Tape based Backup
    • Online backup
  4. Vulnerabilities of Operating Systems and Information Systems
    • What is Vulnerability
    • Operating Systems and Software Vulnerability
    • Running Virus Protection Software
    • Updating Security Patches for Software
    • Approved Software
    • FTP Vulnerability
    • Trojan Horses
    • Who is at Risk of Trojan Horses
    • Protection against Trojans
  5. Risk Management
    • What is Risk Management
    • Key Roles in the Risk Management Process
    • Risk Assessment
    • Characterising the System
    • Identifying Threats
    • Control Analysis
    • Determining Likelihood Ratings
    • Analyzing the Impact
    • Determining the Risks
    • Controls Recommendations
    • Risk Mitigation
    • Risk Evaluation
  6. Information Security Technologies, Developments and Initiatives
    • What is VPN (Virtual Private Network)
    • Features and Benefits of VPN
    • Components of Remote Access VPN
    • Protocols Used in VPN Connections
    • Advantages and Disadvantages of VPN
    • What is a Firewall
    • Main Functions of Firewalls
    • Packet Filtering
    • Circuit Relay
    • Application Gateway
    • Firewall Rules
    • What are Intrusion Detection Systems (IDS)
    • Types of IDS
    • IDS versus Firewalls
  7. Physical Security
    • What is Physical Security?
    • Natural Disasters and Controls
    • Lightning
    • Power Loss
    • Fire
    • Earthquake
    • Liquid Leakage
    • The Human Factor
    • Locks
    • Tokens
    • Challenge-response Tokens
    • Dumb Cards
    • Smart Cards
    • Biometric Devices
    • Fingerprint Scanners
    • Retnal Scan Devices
    • Palm Scan Devices
    • Hand Geometry Devices
    • Facial Recognition Devices
  8. Developing a security Policy
    • Introduction
    • Need for Security
    • Importance of Security Policy
    • Developing a Security Policy
  9. Implementing and revising a security policy
    • Introduction
    • Communicating the Security Policy
    • Enforcing the Security Policy
    • Assessing the Security Policy
    • Common Security Policies
    • Password Policy
    • Access Control Policy
    • Displaying a Warning Notice
    • Audit Policy
    • Server Security Policy
    • Automatically Forwarded Emailsa Policy
    • Information Sensitivity Policy
    • Anti Virus Policy
    • Remote Access Policy
    • Wireless Communication Policy
  10. Business Continuity and Disaster Recovery Planning
    • Difference between disaster recover and business continuity?
    • Disaster recovery plan
    • Business continuity plan
  11. Information Security Maintenance
    • Time Management
    • Networking
    • Management
    • Attitude
    • Procedures
    • Products and Services
    • The Law

Each lesson culminates in an assignment which is submitted to the school, marked by the school's tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.


WHO IS USING YOUR COMPUTER?

 
The first step is to ensure that only the authorised people are able to view that information, because confidentiality is a very important attribute when it comes to information security. 
This may be obvious and simple -but it is a measure that is all too often relaxed.
This course does of course deal with much more complex issues as well though!
 
In some countries, there is a need to protect the privacy of individuals and prevent unlawful access to their information. This includes, but is not limited to: information stored in banks, hospitals and medical records, medical laboratories and medical research data, the tax office and many others.

When private information is circulating on an insecure network, it may be subject to many forms of misuse, including theft and corruption. Data corruption occurs when information is modified by a third-party, thus resulting in the loss of integrity for this data. It is important to note that information can be modified by people with or without malicious intent; for this reason, it is important to keep confidential information secure at all times, to avoid any accidental tampering (such as human error) or intentional tampering.

Needless to say, it is always important to maintain data integrity during any type of communication, but in critical cases such as EFT (electronic funds transfer), army and security agencies communications, and air traffic control, maintaining data integrity becomes an absolute necessity. This means that extreme care should be taken to prevent data from being deleted, modified, or becoming inaccessible, this resulting in loss of data availability and people won’t be able to access the information when required.

To secure data availability on the network, it is important to reduce network outages as much as possible, because the availability of the network itself is extremely important. If the network is down, network users will not be able to access the network and any resources available on that network.

Most organisations nowadays apply some form of security to restrict unlawful access to data stored on their networks. This is mainly achieved by using authentication and authorisation which will be explained below:

Authentication on a network provides a proof that a network user is indeed the person they are claiming to be, either by asking the user to input a password (something they know), a smartcard (something they have), or a biometric identity print (such as a finger print).

Authorisation on a network provides a proof that a certain network user has the right to read a file, run a program, delete a folder, or perform other network activities.

It is important to understand that authentication and authorisation work together, because a user needs to be authenticated first before they can be authorised to perform network activities.

 
Since 1999 ACS has been a recognised member of IARC (International Approval and Registration Centre). A non-profit quality management organisation servicing education.

ACS Distance Education holds an Educational Membership with the ATA.

ACS Global Partner - Affiliated with colleges in seven countries around the world.

UK Register of Learning Providers, UK PRN10000112


How can I start this course?

You can enrol at anytime and start the course when you are ready. Enrolments are accepted all year - students can commence study at any time. All study is self paced and ACS does not set assignment deadlines.

Please note that if a student is being assisted by someone else (e.g. an employer or government subsidy), the body offering the assistance may set deadlines. Students in such situations are advised to check with their sponsor prior to enrolling. The nominal duration of a course is approximately how long a course takes to complete. A course with a nominal duration of 100 hours is expected to take roughly 100 hours of study time to complete. However, this will vary from student to student. Short courses (eg. 100 hrs duration) should be completed within 12 months of enrolment. Certificates, Advanced Certificates and Awards (eg. over 500 hours duration) would normally be completed within 3 -5 years of enrolment. Additional fees may apply if a student requires an extended period to complete.
If a student cannot submit their assignments for 6 months to ACS, they should advise the school to avoid cancellation of their student
registration. Recommencement fees may apply.

Simply click on the ENROL OPTIONS button at the top of this screen and follow the prompts.

You can see the course price at the top of this page. Click 'enrolment options' to see any payment options available.

You can pay by Credit Card, PayPal, Afterpay or bank transfer.

Yes! We have payment plans for most courses. Click 'enrolment options' to see the available payment plans.
We also have Afterpay that will allow you to pay for your course or payment plans in four instalments (if you are in Australia).


What do I need to know before I enrol?

There are no entry requirements that you need to meet to enrol in our courses, our courses are for everyone.
If you are under 18, we need written permission from your parent/ guardian for your enrolment to continue, we can arrange that after you have enrolled.

You don’t need to purchase any additional resources to complete our courses.

We aim to teach you the essentials without you having to purchase any specific computer program.
We recommend that you have access to a word processing program, such as Microsoft Word or Google Docs, so that you can easily complete and submit your assignments.

You sure can. We are here to help you learn whatever your abilities.

Yes, if you are enrolling in a Certificate or Advanced Certificate, you might be eligible for credits if you have evidence of your previous studies or relevant experience. More information is here.

We recommend that you are able to browse websites, send emails and conduct online research. You will need to be able to type and submit your assignments.
If you have limited computer skills, we can make special arrangements for you.

This is possible, it depends on the institution. We recommend that if you would like to use our courses that you contact the institution first. Our Course Handbook is a good resource for this.

Our courses are written in English and we only have English speaking academic staff. If you can read and complete your assignments in English, our courses are ideal for you.

Our courses are designed to build knowledge, hands on skills and industry connections to help prepare you to work in the area, running your own business, professional development or as a base for further study.

This course has been designed to cover the fundamentals of the topic. It will take around 100 hours to complete, which includes your course reading, assignment work, research, practical tasks, watching videos and anything else that is contained in the course. Our short courses are a great way to do some professional development or to learn a new skill.

It’s up to you. The study hours listed in the course are a rough guide, however if you were to study a short course (100 hours) at 10 hours per week, you could finish the course in 10 weeks (just an example). Our courses are self-paced, so you can work through the courses in your own time. We recommend that you wait for your tutor to mark and return your assignment before your start your next one, so you get the benefits of their feedback.

The course consists of course notes, videos, set tasks for your practical work, online quizzes, an assignment for each lesson (that you receive feedback from your tutor from) and ends in an exam (which is optional, if would like to receive the formal award at the end), using our custom built Learning Management System - Login.Training.

Our courses are designed for adults to gain professional development and skills to further their careers and start businesses.

Our custom online learning portal allows you to conduct your learning online. There may be practical tasks that you can do offline. You have the option of downloading your course notes or print them to read later.

There is also the option to pay an additional fee for printed course notes and or USB (availability limited to location and deliverability).

Yes, if you don’t have access to the internet, you can receive the course as paper notes or on a USB stick for an additional fee. We can also make alternative arrangements for you to send your assignments to us.

We offer printed notes for an additional fee. Also, you can request your course notes on a USB stick for an additional fee.

Yes, your tutor is here to help you. Simply post any questions you have in your login.training portal or contact the office and we can pass on a message to your tutor.

We are more learning focussed, rather than assessment focussed. You have online quizzes to test your learning, written assignments and can complete an exam at the end of the course (if you want to receive your certificate). You will not receive a pass/ fail on your course work. If you need to add more details on your assignment, we will ask you to resubmit and direct you where you need to focus. If you need help, you can ask your tutor for advice in the student room.

Each module (short course) is completed with one exam.

Exams are optional, however you must sit an exam if you would like to receive a formal award. You will need to find someone who can supervise that you are sitting the exams under exams conditions. There is an additional cost of $55 (AUS) $50 (O/S) for each exam.
More information is here

There are practical components built into the course that have been designed to be achieved by anyone, anywhere. If you are unable to complete a task for any reason, you can ask your tutor for an alternative.

When you complete the course work and the exam and you will be able receive your course certificate- a Statement of Attainment. Otherwise, you can receive a Letter of Completion.

You can bundle the short courses to create your own customised learning bundle, Certificates or Advanced Certificates. More information is on this page.

Yes, our courses are built to be applicable for people living anywhere in any situation. We provide the fundamentals, and each student can apply their own unique flair for their own interests, region and circumstances with the one-on-one guidance of a tutor. There is also a bit of student directed research involved.

Employers value candidates with industry skills, knowledge, practical skills and formal learning. Our courses arm you with all of these things to help prepare you for a job or start your own business. The longer you study the more you will learn.

ACS has an arrangement with OAMPS (formerly AMP) who can arrange Professional Indemnity from Australian and New Zealand graduates across all disciplines. Ph: 1800 222 012 or email acs@oamps.com.au.


Who are ACS Distance Education?

ACS Distance Education have been educating people for over 40 years.

We are established and safe- we have been in education for over 40 years.
We are focused on developing innovative courses that are relevant to you now and what you will need to know in the future.
We are focused on helping you learn and make the most of your experience.
You can enrol at any time, you can work on your course when it suits you and at your own pace.
We are connected to many industry bodies and our staff participate in continuous improvement and learning activities to ensure that we are ahead of what learning is needed for the future.

Our courses are not accredited by the Australian Government. However many of our courses are recognised and held in high regard by many industry bodies.

Our courses are written by our staff, who all have many years experience and have qualifications in their speciality area. We have lots of academic staff who write and update our courses regularly.


How do I enrol my staff/ sponsored students?

Yes, you can do a request for a bulk enrolment and request an invoice on our Invoice Request Form

We can prepare an invoice, quote or proforma invoice. Simply complete your details on our Invoice Request form

We can arrange bulk discounts for your course enrolment, please get in touch with us to discuss your needs.

Yes, we have many students who are in locked facilities, such as prisons or hospitals. We can cater by also offering paper notes at an additional cost.


What if I have any more questions or need more information?

We can assist you to find the right course for your needs. Get in touch with us via email (admin@acs.edu.au) call on +61 7 5562 1088 or complete our course advice form.


What if I change my mind?

Please get in touch with studentservices@acs.edu.au if you would like to be removed from our mail list.

If you would like ACS Distance Education to delete your information at any time (whether you are a customer or a prospective customer), please contact our privacy officer and we will process this ( admin@acs.edu.au ).




Course Contributors

The following academics were involved in the development and/or updating of this course.

Josiane Joubran

CSC consultant with IBM, Software QA Engineer, Course Writer and Tutor. Josiane is an I.T professional with extensive experience with computer hardware and engineering in Lebanon and Australia. Josiane has a B.Eng., Grad.Dip.I.T., Master Info.Tech., MCP,

Dr. Sherif Sakr

Research Scientist and University Lecturer in Computer Science and Engineering. Sherif has a PhD in Computer Science, MSc, BSc.

Sarah Jury

Over 15 years working in small business, I.T., education and science. Sarah has a PGCE(Post Compulsory Education), BSc(Hons) (Genetics), DipComp(Open), CertWebApps(Open).
She has designed and created several Web sites for different organisations.





Tutors

Meet some of the tutors that guide the students through this course.

Helen Rex

Dip.I.T., Cert IT, part B.A.

Helen started her career as a chef before travelling extensively in Europe while living in the U.K. She moved from cooking to the financial markets where she started her career in Information Technology.
With over 25 years experience in information technology primarily in the financial markets, local government and animal health sectors. Helen moved from working in IT to the education sector where she has been involved
in tutoring, course development and learning management systems.
She is currently living in rural New South Wales with her family and enjoying studying law part time.

Josiane Joubran

.

Alan Vo

Alan has 14 years experience as an I.T professional in Australia. Extensive experience with software engineering, web development, web marketing, and ecommerce at digital agencies as well as client-sides on various projects and industries.

Need Help?

Take advantage of our personalised, expert course counselling service to ensure you're making the best course choices for your situation.


I agree for ACS Distance Education to contact me and store my information until I revoke my approval. For more info, view our privacy policy.