Information security
Qualification dates
Start |
End |
|
|
Be on the front line of defence against hackers. Learn what matters to your organisation and how to protect it. This module takes a practice-based approach based on an organisation you are familiar with. Gain foundational knowledge, understanding, analysis and synthesis needed to understand the development of a practical information security management system (to ISO 27000 standards, particularly 27001 and 27002). You’ll also acquire personal development skills to keep abreast of significant developments in this rapidly evolving field.
What you will study
The module has three blocks.
Block 1
You’ll begin by learning about current requirements on, and incentives for, organisations to implement information security. Next, you’ll study the foundations of the subject, learning to identify and value information as an organisational asset. You’ll learn about international standards for security. And start to understand what it is to protect an organisation, through identifying the most valuable information to your organisation. You’ll learn about the value of, and how to value, information; what risk is; what it means to be at the top of the security tree in an organisation; and something cyber that you never knew about squirrels. Also, you’ll learn about library services and how to start your InfoSec research.
Block 2
In this block, you’ll investigate in detail the risks faced by your organisation’s information, through a guided risk assessment. You’ll be able to distinguish a threat from a vulnerability and know what to do about both. You’ll be able to use a risk thermometer, and estimate and use your organisation’s risk appetite to get your risk analysis perfect for its context. The human aspect of InfoSec is one of the most important, and you’ll focus on the risk that your colleagues (and you) raise if you’re not careful. Also, you’ll learn how to dig deep into an academic paper on InfoSec, to get every drop of value.
Block 3
In this block, you’ll learn how to protect the value that your organisation has in its information by solving the puzzle of what your organisation needs. We’ll go through many of the most important risk controls, understanding how each applies in your situation. And you’ll start to prepare your report on what precisely is needed. You’ll also prepare for the end-of-module assessment, where you can demonstrate what you’ve learned about InfoSec research.
Entry requirements
This module has no formal entry requirements.
if you’re not sure you’re ready.
What's included
You’ll have access to a module website, which includes:
- a week-by-week study planner
- course-specific module materials
- audio and video content
- assignment details and submission section
- online tutorial access.
We’ll also provide a downloadable copy of the module book – IT Governance: An International Guide to Data Security and ISO27001/ISOO27002.
Computing requirements
- Primary device – A desktop or laptop computer. It’s possible to access some materials on a mobile phone, tablet or Chromebook; however, they may not be suitable as your primary device.
- Peripheral device – Headphones/earphones with a built-in microphone for online tutorials.
- Our OU Study app operates on supported versions of Android and iOS.
- Operating systems – Windows 10 or 11 or macOS Ventura (or higher).
- Internet access – Broadband or mobile connection.
- Browser – Google Chrome and Microsoft Edge are recommended; Mozilla Firefox and Safari may be suitable.