Information Security II


Course title   

Information Security II

Course Codes          










Course offered in

Refer to Programme Course Selection Sheet, online


1 trimester





To enable learners to develop an understanding of the foundations of cybersecurity, threats towards information system, and perform risk assessment and management.


Learning Outcomes

On successful completion of this course, the learner will be able to:

  1. Describe information security principles, key terms and essential concepts and examine the business drivers behind the design process of information security analysis
  2. Identify and explain common attack techniques and sources of threat
  3. Conduct a fundamental information security assessment for an organisation, including risk identification and assessment, implementing effective control measures to minimise the risk introduced by potential threats, and performing cost-benefit analysis
  4. Describe and apply physical, procedural and technical controls to protect information system components
  5. Describe and explain legal, regulatory, and ethical standards relevant to information systems


Indicative content

  • Confidentiality, integrity and availability
  • Identification, authentication, authorisation and access control
  • Auditing and accountability
  • Attacks, threats and vulnerabilities
  • Operating system and application security
  • Physical, personnel and operations security
  • Network security controls
  • Security standards and policies
  • Risk assessment and management
  • Legal, ethical and professional issues in information security

Have a question
or feedback?

Call us on 0800 935 832
or send us a message