Micro-Credential in Information Security

Duration

2 Months (8 Weeks)

Mode of Delivery

Online/ Face to Face

Online

Application

Programme Overview

The course offered by Lincoln University College (LUC) is focused to have developed the self-reflective mindset, the analytic mindset, the collaborative mindset, the worldly mindset and the action mindset. In this course students learn basics of information security, in both management aspect and technical aspect. Students understand of various types of security incidents and attacks, and learn methods to prevent, detect and react incidents and attacks. Students will also learn basics of application of cryptography which are one of the key technologies to implement security functions.

The course covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. It also includes protection from unplanned events and natural disasters.

Learning Outcomes

On completion of the course participants should be able to:

  • Apply cyber security architecture
  • Describe risk management processes and practices in the group
  • Identify security tools that hardening
  • Distinguish system and application security threats and vulnerabilities.

 

Course Progression

Credits from this Micro-Credential Programme are transferable to the following full academic programme:

  • Master of Computer Science

Assessments

  • Test (20%)
  • Lab Reports (20%)
  • Written Assignment (10%)
  • Final Examination (50%)

Study Plan for Micro-Credential in Information Security

Week 1

 

Introduction to Information

·         Security Policies

·         About Policies

·         Importance of Policies

·         Time for policies development

·   Process of Policy developed Policy needs and Identification.

Storage and disposal of data –

·         Intellectual Property rights and Policies

·         Incident Response

·         Forensics

·   Management Responsibilities Role of Information Security Department

·          Security

·          Management and Law Enforcement

·          Security awareness training and support.

Seminar Session

Simulations

Week 2

 

Policy Definitions

·          Standards

·          Guidelines

·          Procedures with examples

·          Policy Key elements

Policy format and Basic Policy Components

·          Policy content considerations

·          Program Policy

·    Examples – Business Goal Vs Security Goals – Computer

Assignment

Practical exercise

Week 3

 

Security Objectives

·          Mission

·          statement Format

·     Examples – Key roles in Organization – Business Objectives

– Standards

·          International Standards.

Planning

·          Periodic System and Network Configuration Audits

·          Authentication and Network

Practical exercise

Week 4

 

Security

·         Addressing and Architecture Access Control

·         Login Security

·         Passwords

·         User

Interface

·         Telecommuting and Remote Access

·         Internet Security Policies

·         Administrative

·         User Responsibilities

·         WWW Policies

·         Application Responsibilities

·         E-mail Security

Test

Week 5

 

Establishing Type of Viruses Protection

·          Rules for handling Third Party Software – User

Involvement with Viruses

·          Legal Issues- Managing Encryption and Encrypted data – Key

Generation considerations and Management

·          Software Development policies – Processes

Testing       and     Documentation-Revision control  Configuration management

·          Third Party

·          Development

·          Intellectual Property Issues

Practical exercise

Week 6

 

Maintaining the Policies

·         Writing the AUP – User Login Responsibilities – Organization’s

·         responsibilities and Disclosures- Compliance and Enforcement – Testing and Effectiveness of

·          Policies – Publishing and Notification Requirements of the Policies- Monitoring, Controls and

·         Remedies – Administrator Responsibility – Login Considerations – Reporting of security

Practical exercise

 

 

Week 7

 

Problems

·          Policy Review Process

·          The Review Committee-Sample Corporate Policies

·           Sample Security Policies

Submission of Assignments Submission of Lab Report

Week 8

 

Final Examination

Conclusion Session Awarding of Certificates

Presentation by VC or Representative of VC

Why Micro-Credential in Lincoln University College (LUC), Malaysia?

Micro-credentials in Lincoln University College (LUC), Malaysia offer a flexible, targeted, and accelerated pathway of acquiring industry-relevant skills that meet the demands of today’s evolving job market. Designed for students, professionals, and individuals seeking to upskill or reskill, credentials offer learning experiences and formally recognized certifications, with enhanced employability, and serving as stepping stones to higher qualifications. LUC’s micro-credential programs are supported by strong academic frameworks and offer clear progression pathways into full-fledged degree programs. After completing this Micro-credential course, professionals can use their updated skills to apply for promotions or switch to a different job role.

Help us to guide you better

Thank you for visiting lincoln.edu.my
So that we can guide you accurately and show you the most relevant information, please fill up the details below. 

Help us to guide you better

Thank you for visiting lincoln.edu.my
So that we can guide you accurately and show you the most relevant information, please fill up the details below. 

 

Verify Result/Certificate


 

E-mail: verify@testing.lincoln.edu.my

 

EasyTransfer

USDMYR

Bank Transfer

Flywire

USDMYR