Peer Review for material titled "Information Security"
eTextbook Reviews for material titled "Information Security"
User Rating for material titled "Information Security"
Member Comments for material titled "Information Security"
Bookmark Collections for material titled "Information Security"
Course ePortfolios for material titled "Information Security"
Learning Exercises for material titled "Information Security"
Accessibility Info for material titled "Information Security"
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
A Bookmark with this title already existed.
Please limit a note about this material to 2048 characters
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
A Bookmark with this title already existed.
Please limit a note about this material to 2048 characters
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help

MERLOT II

Advanced Search



        

Search > Material Results >

Information Security

        
Rate this material with
star
Rate This:
Your Rating:
/merlot/images/apricotstars/
User average rating of
User average rating of
We could not retrieve the rating, please try again.
Failed to retrieve material ID, please try again.
Thank you for interest in the material.
MERLOT only allows 5 ratings an hour from a non-logged in user.
Log in to rate this material now.

Information Security

Logo for Information Security
This course focuses on the fundamentals of information security -- protection of the information present in computer storage as well as information traveling over computer networks. Topics include fundamentals of information security, computer security technology and principles, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment. This free course may be completed online at any time. See course site for detailed... More
Go to material
Material Type: Online Course
Technical Format: Website
Date Added to MERLOT: January 27, 2012
Date Modified in MERLOT: March 01, 2017
Author:
Send email to archivist@saylor.org
Submitter: Sean Connor
Keywords: Prevention, Intrusion, Computer Security, Computer Science, Information Security, Public-Key, Software, Encryption, Cryptography, Detection, Firewalls

Quality

  • Reviewed by members of Editorial board for inclusion in MERLOT.
    Editor Review (not reviewed)
  • User review 3.33 average rating
  • Comments (none)
  • Learning Exercises (none)
  • Bookmark Collections (none)
  • Course ePortfolios (none)
  • Accessibility Info (none)

  • Rate This: Rate this material with one star Rate this material with two stars Rate this material with three stars Rate this material with four stars Rate this material with five stars
  • Add learning exercise this materialCreate a Learning Exercise
  • Add accessibility to this materialAdd accessibility information
  • Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
    Name the Bookmark Collection to represent the materials you will add
    Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
    Edit the information about the material in this {0}
    Submitting Bookmarks...

About

Primary Audience: College Upper Division
Mobile Platforms: Not specified at this time
Language: English
Material Version: 0
Cost Involved: no
Source Code Available: no
Accessibility Information Available: no
Creative Commons: Creative Commons License
This work is licensed under a Attribution 3.0 United States

Connections



QR Code for this Page

Users who viewed this material also viewed...

Comments / Discussions

Discussion for Information Security

Log in to participate in the discussions or Sign up if you are not already a MERLOT member.

Return to Top of Page