The course "Information Security" aims to prepare you for a deeper understanding and application of information security principles and practices essential for today’s digital landscape. In this course, you’ll be introduced to the fundamental concepts of securing information systems, program security, database integrity, operating system protections, cloud security, and privacy frameworks. You’ll learn about various types of security threats, vulnerabilities, and defences, as well as the legal and ethical dimensions of cybersecurity. The course covers a wide variety of topics, from program-level safeguards to physical security and auditing practices. These topics are designed to give you an overview of critical areas within the field, serving as a foundation for further specialisation and research in your degree program. Whether you're interested in secure software design, cloud infrastructure security, or the evolving challenges in privacy and anonymity, this course offers a comprehensive starting point to build your expertise in cybersecurity.

Information Security
Grow your skills with Coursera Plus for $239/year (usually $399). Save now.

Recommended experience
Recommended experience
Intermediate level
Basic knowledge of computer systems, networking, and programming, along with familiarity with operating systems and databases, is recommended.
Recommended experience
Recommended experience
Intermediate level
Basic knowledge of computer systems, networking, and programming, along with familiarity with operating systems and databases, is recommended.
What you'll learn
Analyse various security threats, vulnerabilities, and corresponding mitigation techniques to protect information systems.
Design secure programs, databases, and operating systems by applying principles of secure software development and system protection.
Evaluate privacy, legal, and ethical considerations in implementing cybersecurity solutions across diverse environments.
Details to know

Add to your LinkedIn profile
99 assignments
See how employees at top companies are mastering in-demand skills

There are 12 modules in this course
In this module, the learners will be introduced to the course and its syllabus, setting the foundation for their learning journey. The course's introductory video will provide them with insights into the valuable skills and knowledge they can expect to gain throughout the duration of this course. Additionally, the syllabus reading will comprehensively outline essential course components, including course values, assessment criteria, grading system, schedule, details of live sessions, and a recommended reading list that will enhance the learner’s understanding of the course concepts. Moreover, this module offers the learners the opportunity to connect with fellow learners as they participate in a discussion prompt designed to facilitate introductions and exchanges within the course community.
What's included
3 videos1 reading1 discussion prompt
3 videos• Total 4 minutes
- Meet Your Instructor - Dr. Rajesh Kumar• 1 minute
- Meet Your Instructor - Prof. Hemath Rathore• 2 minutes
- Course Introductory Video• 1 minute
1 reading• Total 10 minutes
- Course Overview • 10 minutes
1 discussion prompt• Total 10 minutes
- Meet Your Peers• 10 minutes
This module provides an overview of information security, covering its foundational concepts, evolution, key components, and importance in the digital age. It introduces the concepts of risks, vulnerabilities, threats, and the motivations of threat actors, laying the groundwork for understanding the modern cybersecurity landscape.
What's included
11 videos3 readings10 assignments1 discussion prompt
11 videos• Total 145 minutes
- Foundations of Information Security - 1• 9 minutes
- Foundations of Information Security - 2• 14 minutes
- Foundations of Information Security - 3• 9 minutes
- Threats, Vulnerabilities and Attacks• 9 minutes
- Computer Malware• 15 minutes
- Phishing Attack• 8 minutes
- Ransomware Attacks• 5 minutes
- DoS Attacks• 4 minutes
- Information Security Framework and Standards• 7 minutes
- Design Principles• 7 minutes
- Recording of Information Security: Week 1 - Live Session on 25-05-23 18:32:34 [56:43]• 57 minutes
3 readings• Total 100 minutes
- Recommended Reading: Overview of Information Security• 30 minutes
- Recommended Reading: Attacks and Vulnerability in Information Security• 30 minutes
- Recommended Reading: Information Security Risk Management - Tools & Technique• 40 minutes
10 assignments• Total 69 minutes
- Foundations of Information Security - 1• 9 minutes
- Foundations of Information Security - 2• 9 minutes
- Foundations of Information Security - 3• 9 minutes
- Threats, Vulnerabilities and Attacks• 6 minutes
- Computer Malware• 6 minutes
- Phishing Attack• 6 minutes
- Ransomware Attacks• 6 minutes
- DoS Attacks• 6 minutes
- Information Security Framework and Standards• 6 minutes
- Design Principles• 6 minutes
1 discussion prompt• Total 30 minutes
- Foundations of Information Security: Risks, Attacks, and Prevention• 30 minutes
This module delves into security policies and access control, which are crucial for managing and restricting access to sensitive information. Learners will explore various types of access control mechanisms and how these are enforced through policy frameworks. The module also discusses confidentiality, integrity, and hybrid policies, giving a foundational understanding of how organisations safeguard data against unauthorised use.
What's included
7 videos3 readings8 assignments1 discussion prompt
7 videos• Total 76 minutes
- Introduction to Security Policies• 9 minutes
- Mechanism Ensuring Security Policy• 4 minutes
- Introduction to Access Control• 11 minutes
- Access Control Mechanisms• 11 minutes
- Confidentiality Policy• 15 minutes
- Integrity Policies• 17 minutes
- Hybrid Policies• 8 minutes
3 readings• Total 140 minutes
- Recommended Reading: Security Policies• 40 minutes
- Recommended Reading: Access Control• 50 minutes
- Recommended Reading: Security Policy Frameworks• 50 minutes
8 assignments• Total 138 minutes
- Graded Quiz - Modules 1 and 2 • 60 minutes
- Introduction to Security Policies • 9 minutes
- Mechanism Ensuring Security Policy • 9 minutes
- Introduction to Access Control • 12 minutes
- Access Control Mechanisms • 12 minutes
- Confidentiality Policy • 12 minutes
- Integrity Policies • 12 minutes
- Hybrid Policies • 12 minutes
1 discussion prompt• Total 30 minutes
- Securing Systems Through Access Control and Policy Frameworks• 30 minutes
This module focuses on implementing security at different layers of the OSI model, from network to application. Learners will gain hands-on knowledge of security protocols such as IPSec, TLS/SSL, and secure application communication. The module also introduces real-world attack vectors and how to defend against them using layered security approaches.
What's included
13 videos3 readings12 assignments1 discussion prompt
13 videos• Total 135 minutes
- Network Layer Security• 9 minutes
- IPSec and Security Associations• 9 minutes
- IPSec Protocols and Encryption• 8 minutes
- TLS / SSL Protocols• 7 minutes
- SSL Handshake• 6 minutes
- Authentication and Key Distribution• 7 minutes
- Secure Remote Access• 7 minutes
- Email Security• 8 minutes
- Web Security - Setup• 8 minutes
- Cookie Theft• 6 minutes
- Attacks on Web Applications• 9 minutes
- Cross Site Scripting• 5 minutes
- Recording of Information Security: Week 2 - Live Session on 25-06-02 19:37:37 [46:43]• 47 minutes
3 readings• Total 190 minutes
- Recommended Reading: Network Security• 60 minutes
- Recommended Reading: Security at Transport Layer• 50 minutes
- Recommended Reading: Security at Application Layer• 80 minutes
12 assignments• Total 72 minutes
- Network Layer Security• 6 minutes
- IPSec and Security Associations• 6 minutes
- IPSec Protocols and Encryption• 6 minutes
- TLS/ SSL Protocols• 6 minutes
- SSL Handshake• 6 minutes
- Authentication and Key Distribution• 6 minutes
- Secure Remote Access• 6 minutes
- Email Security• 6 minutes
- Web Security - Setup• 6 minutes
- Cookie Theft• 6 minutes
- Attacks on Web Applications• 6 minutes
- Cross Site Scripting• 6 minutes
1 discussion prompt• Total 30 minutes
- Layered Security: Defending Systems Across the OSI Stack• 30 minutes
This module explores various network defenses and system-level protections, including intrusion detection/prevention systems, firewalls, and secure OS configurations. Learners will also explore secure software development practices, physical infrastructure security, and the role of human factors in cybersecurity.
What's included
15 videos4 readings14 assignments1 discussion prompt
15 videos• Total 264 minutes
- Intrusion Detection Systems - Fundamentals • 7 minutes
- Types of Intrusion Detection System• 9 minutes
- Intrusion Prevention System (IPS)• 3 minutes
- Firewall Fundamentals• 4 minutes
- Firewalls Configurations• 4 minutes
- CPU Modes • 8 minutes
- UNIX Access Control• 10 minutes
- Operating System Security: Best Practices• 7 minutes
- Secure Software Development • 8 minutes
- Buffer Overflow• 12 minutes
- Common Software Vulnerabilities and Best Practices• 14 minutes
- Physical and Cyber Attacks• 7 minutes
- Human Factors• 10 minutes
- Recording of Information Security: Week 3 - Live Session on 25-06-09 18:44:17 [51:53]• 52 minutes
- Recording of Information Security: Week 4 - Live Session on 25-06-13 18:34:20 [49:14]• 109 minutes
4 readings• Total 240 minutes
- Recommended Reading: Network Defenses • 60 minutes
- Recommended Reading: Securing Operating Systems• 60 minutes
- Recommended Reading: Program Security• 60 minutes
- Recommended Reading: Physical and Infrastructure Security• 60 minutes
14 assignments• Total 177 minutes
- Graded Quiz - Modules 3 and 4 • 60 minutes
- Intrusion Detection Systems - Fundamentals • 9 minutes
- Types of Intrusion Detection System• 9 minutes
- Intrusion Prevention System (IPS)• 9 minutes
- Firewall Fundamentals• 9 minutes
- Firewall Configurations• 9 minutes
- CPU Modes • 9 minutes
- UNIX Access Control• 9 minutes
- Operating System Security: Best Practices• 9 minutes
- Secure Software Development • 9 minutes
- Buffer Overflow• 9 minutes
- Common Software Vulnerabilities and Best Practices• 9 minutes
- Physical and Cyber Attacks• 9 minutes
- Human Factors• 9 minutes
1 discussion prompt• Total 30 minutes
- Fortifying the Foundations: Exploring Security and Network Defenses• 30 minutes
This module introduces learners to threat modelling techniques and frameworks such as attack trees and the cyber kill chain. It also covers attack classification databases (CAPEC, CVE, CVSS), incident response procedures, and the legal and ethical dimensions of cybersecurity. The module culminates in a staff-graded assessment for applied learning.
What's included
11 videos4 readings11 assignments1 discussion prompt
11 videos• Total 122 minutes
- Threat Modelling Basics • 11 minutes
- Cyber Kill Chain• 5 minutes
- Attack Tree• 11 minutes
- CAPEC • 5 minutes
- CVE• 9 minutes
- CVSS• 14 minutes
- CVSS Scoring - An Example• 3 minutes
- Incident Response Technologies• 9 minutes
- Ethical Dilemma• 7 minutes
- Legal Frameworks in Information Security• 7 minutes
- Recording of Information Security: Week 5 - Live Session on 25-06-20 18:34:58 [45:59]• 41 minutes
4 readings• Total 300 minutes
- Recommended Reading: Threat Modelling Frameworks• 90 minutes
- Recommended Reading: Attack Databases• 90 minutes
- Recommended Reading: Incident Response• 60 minutes
- Recommended Reading: Legal and Ethical Aspects• 60 minutes
11 assignments• Total 210 minutes
- SGA-1: Implementing Security Measures for a Modern IP Network• 120 minutes
- Threat Modelling Basics • 9 minutes
- Cyber Kill Chain• 9 minutes
- Attack Tree• 9 minutes
- CAPEC • 9 minutes
- CVE (Common Vulnerabilities and Exposures)• 9 minutes
- CVSS (Common Vulnerability Scoring System)• 9 minutes
- CVSS Scoring - An Example• 9 minutes
- Incident Response Technologies• 9 minutes
- Ethical Dilemma• 9 minutes
- Legal Frameworks in Information Security• 9 minutes
1 discussion prompt• Total 30 minutes
- Anticipate and Respond: The Role of Threat Modelling and Incident Response• 30 minutes
This module provides a foundational understanding of information security, its key components, and the evolution of encryption techniques. It introduces the classical encryption techniques like substitution and Caesar ciphers, and the mathematical foundations behind these methods.
What's included
8 videos8 readings9 assignments1 discussion prompt
8 videos• Total 80 minutes
- CIA Triad• 12 minutes
- Model for Network Security• 12 minutes
- Types of Network Attacks• 9 minutes
- Kerckhoff Principle and Substitution Cipher• 11 minutes
- Caesar Cipher• 9 minutes
- Attacks and Limitations of Historical Ciphers• 10 minutes
- Introduction to Modular Arithmetic• 12 minutes
- Ring in Modular Arithmetic• 5 minutes
8 readings• Total 115 minutes
- Essential Reading: CIA Triad• 15 minutes
- Recommended Reading: Model for Network Security• 15 minutes
- Recommended Reading: Types of Network Attacks• 15 minutes
- Essential Reading: Kerckhoff Principle and Substitution Cipher• 15 minutes
- Recommended Reading: Caesar Cipher• 15 minutes
- Recommended Reading: Attacks and Limitations of Historical Ciphers• 15 minutes
- Essential Reading: Introduction to Modular Arithmetic• 15 minutes
- Recommended Reading: Ring in Modular Arithmetic• 10 minutes
9 assignments• Total 150 minutes
- Graded Quiz - Modules 5 and 6 • 60 minutes
- CIA Triad• 6 minutes
- Model for Network Security• 12 minutes
- Types of Network Attacks• 12 minutes
- Kerckhoff Principle and Substitution Cipher• 12 minutes
- Caesar Cipher• 6 minutes
- Attacks and Limitations of Historical Ciphers• 12 minutes
- Introduction to Modular Arithmetic• 15 minutes
- Ring in Modular Arithmetic• 15 minutes
1 discussion prompt• Total 30 minutes
- Lessons from Classical Ciphers in the Modern Era• 30 minutes
This module introduces encryption fundamentals, focusing on public and private key cryptographic techniques. It explores the differences between symmetric and asymmetric encryption, the working mechanisms of stream and block ciphers, and their practical applications in modern security.
What's included
8 videos7 readings7 assignments1 discussion prompt
8 videos• Total 143 minutes
- Overview of Symmetric and Asymmetric Cryptography • 12 minutes
- Stream Cipher (Part-1)• 10 minutes
- Stream Cipher (Part-2) • 6 minutes
- Stream Cipher (Part-3) • 11 minutes
- Random Number Generators (RNGs)• 10 minutes
- RC4 (Rivest Cipher 4)• 15 minutes
- RC4 (Example)• 12 minutes
- Recording of Information Security: Week 7 - Live Session on 25-07-04 18:45:36 [07:17]• 67 minutes
7 readings• Total 102 minutes
- Essential Reading: Overview of Symmetric and Asymmetric Cryptography• 15 minutes
- Essential Reading: Stream Cipher (Part-1)• 15 minutes
- Recommended Reading: Stream Cipher (Part-2)• 10 minutes
- Recommended Reading: Stream Cipher (Part-3) • 15 minutes
- Recommended Reading: Random Number Generators (RNGs)• 15 minutes
- Essential Reading: RC4 (Rivest Cipher 4)• 17 minutes
- Recommended Reading: RC4 Example• 15 minutes
7 assignments• Total 90 minutes
- Overview of Symmetric and Asymmetric Cryptography• 30 minutes
- Stream Cipher (Part-1)• 12 minutes
- Stream Cipher (Part-2) • 3 minutes
- Stream Cipher (Part-3) • 6 minutes
- Random Number Generators (RNGs)• 9 minutes
- RC4 (Rivest Cipher 4)• 18 minutes
- RC4 Example• 12 minutes
1 discussion prompt• Total 10 minutes
- Stream Ciphers vs. Block Ciphers: Choosing the Right Tool• 10 minutes
This module delves into asymmetric encryption techniques. It covers RSA and Diffie-Hellman algorithms, block cipher modes of operation, and challenges in modern cryptography, including quantum threats. Learners will explore how these techniques are applied in real-world systems and examine the trade-offs between security, performance, and scalability.
What's included
13 videos12 readings13 assignments1 discussion prompt
13 videos• Total 188 minutes
- Basics of Block Cipher• 11 minutes
- AES (Part-1)• 11 minutes
- AES (Part-2)• 4 minutes
- AES (Part-3)• 9 minutes
- AES (Part-4)• 7 minutes
- AES (Part-5)• 16 minutes
- Block Cipher Modes (Part-1) • 11 minutes
- Block Cipher Modes (Part-2)• 10 minutes
- Block Cipher Modes (Part-3)• 14 minutes
- Brute Force Attack• 7 minutes
- Double Encryption• 12 minutes
- Triple Encryption• 9 minutes
- Recording of Information Security: Week 8 - Live Session on 25-07-11 18:55:10 [09:07]• 69 minutes
12 readings• Total 165 minutes
- Essential Reading: Basics of Block Cipher• 15 minutes
- Recommended Reading: AES (Part-1)• 15 minutes
- Recommended Reading: AES (Part-2)• 10 minutes
- Recommended Reading: AES (Part-3)• 15 minutes
- Recommended Reading: AES (Part-4)• 15 minutes
- Recommended Reading: AES (Part-5)• 15 minutes
- Essential Reading: Block Cipher Modes (Part-1)• 15 minutes
- Recommended Reading: Block Cipher Modes (Part-2)• 15 minutes
- Recommended Reading: Block Cipher Modes (Part-3)• 15 minutes
- Essential Reading: Brute Force Attack• 10 minutes
- Recommended Reading: Double Encryption• 15 minutes
- Recommended Reading: Triple Encryption• 10 minutes
13 assignments• Total 150 minutes
- Graded Quiz - Modules 7 and 8 • 60 minutes
- Basics of Block Cipher• 6 minutes
- AES (Part-1)• 6 minutes
- AES (Part-2)• 6 minutes
- AES (Part-3)• 6 minutes
- AES (Part-4)• 3 minutes
- AES (Part-5)• 3 minutes
- Block Cipher Modes (Part-1)• 9 minutes
- Block Cipher Modes (Part-2)• 6 minutes
- Block Cipher Modes (Part-3)• 15 minutes
- Brute Force Attack• 6 minutes
- Double Encryption• 12 minutes
- Triple Encryption• 12 minutes
1 discussion prompt• Total 30 minutes
- The Importance of Block Cipher Modes of Operation• 30 minutes
This module introduces asymmetric cryptography, focusing on the RSA algorithm and key establishment techniques such as Diffie-Hellman Key Exchange (DHKE). It highlights how asymmetric methods ensure data confidentiality and support secure communication.
What's included
7 videos6 readings6 assignments1 discussion prompt
7 videos• Total 135 minutes
- Introduction to Asymmetric Cryptosystem• 14 minutes
- RSA Algorithm• 16 minutes
- RSA Example• 16 minutes
- Introduction• 16 minutes
- DHKE (Part-1)• 10 minutes
- DHKE (Part-2)• 13 minutes
- Recording of Information Security: Week 9 - Live Session on 25-07-18 18:49:47 [49:06]• 49 minutes
6 readings• Total 90 minutes
- Essential Reading: Introduction to Asymmetric Cryptosystem• 15 minutes
- Recommended Reading: RSA Algorithm• 15 minutes
- Recommended Reading: RSA Example• 15 minutes
- Essential Reading: Introduction• 15 minutes
- Recommended Reading: DHKE (Part-1)• 15 minutes
- Recommended Reading: DHKE (Part-2)• 15 minutes
6 assignments• Total 60 minutes
- Introduction to Asymmetric Cryptosystem• 12 minutes
- RSA Algorithm• 12 minutes
- RSA Example• 6 minutes
- Introduction• 9 minutes
- DHKE (Part-1)• 9 minutes
- DHKE (Part-2)• 12 minutes
1 discussion prompt• Total 30 minutes
- RSA vs. Diffie-Hellman: Different Tools for Different Asymmetric Tasks• 30 minutes
This module covers the concepts of data integrity and authentication, focusing on hash functions and Message Authentication Codes (MACs). It explains how these cryptographic tools are used to verify the integrity and authenticity of information.
What's included
7 videos6 readings8 assignments1 discussion prompt
7 videos• Total 125 minutes
- Introduction to Hash Functions• 13 minutes
- Hash Functions• 15 minutes
- Different Hash Functions • 11 minutes
- Message Authentication Code (Part-1)• 15 minutes
- Message Authentication Code (Part-2)• 15 minutes
- Message Authentication Code (Part-3)• 10 minutes
- Recording of Information Security: Week 10 - Live Session on 25-07-25 18:46:02 [44:53]• 45 minutes
6 readings• Total 85 minutes
- Essential Reading: Introduction to Hash Functions• 15 minutes
- Recommended Reading: Hash Functions• 15 minutes
- Recommended Reading: Different Hash Functions • 10 minutes
- Essential Reading: Message Authentication Code (Part-1)• 15 minutes
- Recommended Reading: Message Authentication Code (Part-2)• 15 minutes
- Recommended Reading: Message Authentication Code (Part-3)• 15 minutes
8 assignments• Total 240 minutes
- Graded Quiz - Modules 9 and 10• 60 minutes
- SGA -2 • 120 minutes
- Introduction to Hash Functions• 6 minutes
- Hash Functions• 12 minutes
- Different Hash Functions • 12 minutes
- Message Authentication Code (Part-1)• 18 minutes
- Message Authentication Code (Part-2)• 6 minutes
- Message Authentication Code (Part-3)• 6 minutes
1 discussion prompt• Total 30 minutes
- Hash Functions vs. MACs: When is Integrity Not Enough?• 30 minutes
Final Comprehensive Examination
What's included
1 assignment
1 assignment• Total 30 minutes
- Final Comprehensive Examination• 30 minutes
Instructors


Offered by

Offered by

Birla Institute of Technology & Science, Pilani (BITS Pilani) is one of only ten private universities in India to be recognised as an Institute of Eminence by the Ministry of Human Resource Development, Government of India. It has been consistently ranked high by both governmental and private ranking agencies for its innovative processes and capabilities that have enabled it to impart quality education and emerge as the best private science and engineering institute in India. BITS Pilani has four international campuses in Pilani, Goa, Hyderabad, and Dubai, and has been offering bachelor's, master’s, and certificate programmes for over 58 years, helping to launch the careers for over 1,00,000 professionals.
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
More questions
Financial aid available,