Required
CS406: Information Security
Learn the principles of information security to protect the confidentiality, integrity, and availability of information. Discuss the modes of threats and attacks on information systems, threat mitigation, cryptography, user identification and authentication, access control, privacy laws, and more.
CS406



Course Syllabus
WELCOME TO CS406: INFORMATION SECURITY Specific information about this course and its requirements can be found below. For more general information about taking Saylor Academy courses, including information about Community and Academic Codes of Conduct, please read the Student Handbook. COURSE DESCRIPTION Learn the principles of information security to protect the confidentiality, integrity, and availability of information. Discuss the modes of threats and attacks on information systems, thre...

The CIA Triad
{GENERICO:type="video",videolink="https://resources.saylor.org/CS/CS406/Videos/CS406_Unit1_2_Introduction_to_Security.mp4",tracklink="https://resources.saylor.org/CS/CS406/Videos/CS406_Unit1_2_Introduction_to_Security.mp4",alttext="Dr. Mike Murphy- Introduction to Security"} ------------------------- Source: Mike Murphy, https://www.youtube.com/watch?v=vJeSxJesyw4 [Creative Commons License] This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 License....
The basis for information security is the CIA triad. After you watch this video, you should be able to define the three principles of confidentiality, integrity, and availability as they relate to information security and the protection of data.

Threats and Vulnerabilities
{GENERICO:type="video",videolink="https://resources.saylor.org/CS/CS406/Videos/CS406_Unit1_3_Threats_Vulnerabilities_and_Controls.mp4",tracklink="https://resources.saylor.org/CS/CS406/Videos/CS406_Unit1_3_Threats_Vulnerabilities_and_Controls.mp4",alttext="Dr. Mike Murphy- Threats Vulnerabilities and Controls"} ------------------------- Source: Mike Murphy, https://www.youtube.com/watch?v=tYOoJp-d6sY [Creative Commons License] This work is licensed under a Creative Commons Attribution-ShareAli...
This video explains threats and vulnerabilities, how they apply to information security, and how they can reduce or compromise the confidentiality, integrity, and availability (CIA) of a system. What is the difference between a threat and a vulnerability? What are threats and vulnerabilities in the context of information systems?

Hashing
{GENERICO:type="video",videolink="https://resources.saylor.org/CS/CS406/Videos/CS406Unit3-3-3-Hashing.mp4",tracklink="https://resources.saylor.org/CS/CS406/Videos/CS406Unit3-3-3-Hashing.mp4",alttext="Dr. Mike Murphy- Hashing"} ------------------------- Source: Mike Murphy, https://www.youtube.com/watch?v=odEfn7YyKXU [Creative Commons License] This work is licensed under a Creative Commons Attribution 3.0 License.
This video will provide a more in-depth view of hashing. From this video, you should learn more about hash collisions, the avalanche affect, and make note of the names of hashing algorithms. You will learn more about the hashing algorithms mentioned in the video later in this unit.

CS406: Certificate Final Exam
ESSENTIAL DETAILS: * You will have TWO (2) HOURS to complete this exam * You must wait 7 DAYS between consecutive attempts of this exam * Exam questions are distributed across multiple pages * Exam questions will have several plausible options; be sure to pick the answer that best satisfies each part of the question * Your answers are saved each time you move to another page in the exam * You can answer the questions in any order * You can go directly to any question by clicking its number in...

Course Feedback Survey
https://saylordotorg.typeform.com/to/i5d5GmAo?utm_source=CS406&utm_medium=coursepage&utm_campaign=compsurvey
Showing 9 results