Birla Institute of Technology & Science, Pilani

Information Security

Grow your skills with Coursera Plus for $239/year (usually $399). Save now.

Birla Institute of Technology & Science, Pilani

Information Security

Rajesh Kumar
Prof. Hemant Rathore

Instructors: Rajesh Kumar

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

8 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

8 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Analyse various security threats, vulnerabilities, and corresponding mitigation techniques to protect information systems.

  • Design secure programs, databases, and operating systems by applying principles of secure software development and system protection.

  • Evaluate privacy, legal, and ethical considerations in implementing cybersecurity solutions across diverse environments.

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

99 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 12 modules in this course

In this module, the learners will be introduced to the course and its syllabus, setting the foundation for their learning journey. The course's introductory video will provide them with insights into the valuable skills and knowledge they can expect to gain throughout the duration of this course. Additionally, the syllabus reading will comprehensively outline essential course components, including course values, assessment criteria, grading system, schedule, details of live sessions, and a recommended reading list that will enhance the learner’s understanding of the course concepts. Moreover, this module offers the learners the opportunity to connect with fellow learners as they participate in a discussion prompt designed to facilitate introductions and exchanges within the course community.

What's included

3 videos1 reading1 discussion prompt

This module provides an overview of information security, covering its foundational concepts, evolution, key components, and importance in the digital age. It introduces the concepts of risks, vulnerabilities, threats, and the motivations of threat actors, laying the groundwork for understanding the modern cybersecurity landscape.

What's included

11 videos3 readings10 assignments1 discussion prompt

This module delves into security policies and access control, which are crucial for managing and restricting access to sensitive information. Learners will explore various types of access control mechanisms and how these are enforced through policy frameworks. The module also discusses confidentiality, integrity, and hybrid policies, giving a foundational understanding of how organisations safeguard data against unauthorised use.

What's included

7 videos3 readings8 assignments1 discussion prompt

This module focuses on implementing security at different layers of the OSI model, from network to application. Learners will gain hands-on knowledge of security protocols such as IPSec, TLS/SSL, and secure application communication. The module also introduces real-world attack vectors and how to defend against them using layered security approaches.

What's included

13 videos3 readings12 assignments1 discussion prompt

This module explores various network defenses and system-level protections, including intrusion detection/prevention systems, firewalls, and secure OS configurations. Learners will also explore secure software development practices, physical infrastructure security, and the role of human factors in cybersecurity.

What's included

15 videos4 readings14 assignments1 discussion prompt

This module introduces learners to threat modelling techniques and frameworks such as attack trees and the cyber kill chain. It also covers attack classification databases (CAPEC, CVE, CVSS), incident response procedures, and the legal and ethical dimensions of cybersecurity. The module culminates in a staff-graded assessment for applied learning.

What's included

11 videos4 readings11 assignments1 discussion prompt

This module provides a foundational understanding of information security, its key components, and the evolution of encryption techniques. It introduces the classical encryption techniques like substitution and Caesar ciphers, and the mathematical foundations behind these methods.

What's included

8 videos8 readings9 assignments1 discussion prompt

This module introduces encryption fundamentals, focusing on public and private key cryptographic techniques. It explores the differences between symmetric and asymmetric encryption, the working mechanisms of stream and block ciphers, and their practical applications in modern security.

What's included

8 videos7 readings7 assignments1 discussion prompt

This module delves into asymmetric encryption techniques. It covers RSA and Diffie-Hellman algorithms, block cipher modes of operation, and challenges in modern cryptography, including quantum threats. Learners will explore how these techniques are applied in real-world systems and examine the trade-offs between security, performance, and scalability.

What's included

13 videos12 readings13 assignments1 discussion prompt

This module introduces asymmetric cryptography, focusing on the RSA algorithm and key establishment techniques such as Diffie-Hellman Key Exchange (DHKE). It highlights how asymmetric methods ensure data confidentiality and support secure communication.

What's included

7 videos6 readings6 assignments1 discussion prompt

This module covers the concepts of data integrity and authentication, focusing on hash functions and Message Authentication Codes (MACs). It explains how these cryptographic tools are used to verify the integrity and authenticity of information.

What's included

7 videos6 readings8 assignments1 discussion prompt

Final Comprehensive Examination

What's included

1 assignment

Instructors

Rajesh Kumar
Birla Institute of Technology & Science, Pilani
3 Courses 444 learners
Prof. Hemant Rathore
Birla Institute of Technology & Science, Pilani
1 Course 443 learners

Offered by

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions