The Information Security Fundamentals course provides a comprehensive introduction to the essential concepts and practices of information security. Learners will understand the importance of information security for the functionality of information systems and learn how to approach and recognize common threats and vulnerabilities. The course covers key elements such as confidentiality, integrity, and availability (CIA Triad), cryptography basics, and the role of technical standards in supplementing legal and regulatory requirements. By the end of this course, learners will be able to grasp fundamental security concepts, follow the tensions between information security and privacy, and simplify technical communications for the C-suite


Information Security Fundamentals
本课程是 Information Security Analyst 专业证书 的一部分

位教师:EC-Council
2,115 人已注册
包含在 中
您将学到什么
Learn fundamental security concepts.
Understand the importance of Information Security for the functionality of the Information System.
Learn how to approach and recognize common threats and vulnerabilities in regard to Information Security.
您将获得的技能
- Cyber Attacks
- Cybersecurity
- Threat Detection
- General Data Protection Regulation (GDPR)
- Human Factors (Security)
- Network Security
- Vulnerability Assessments
- Security Controls
- Cyber Security Policies
- Infrastructure Security
- Security Awareness
- Encryption
- Systems Development Life Cycle
- Risk Management Framework
- Information Systems
- Computer Security
- Cryptography
- ISO/IEC 27001
要了解的详细信息

添加到您的领英档案
June 2025
17 项作业
了解顶级公司的员工如何掌握热门技能

积累 Security 领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 通过 EC-Council 获得可共享的职业证书

该课程共有6个模块
In this section, we dive into the fundamentals of information security and cybersecurity. We'll begin by elucidating the basic definitions and explore the crucial relationship between these two concepts. Furthermore, we delve into the core principles of information security, often referred to as the CIA triad – Confidentiality, Integrity, and Availability. Real-world examples will be used to illustrate these principles, helping you understand their importance in maintaining a secure information environment. Also, since this section focuses on the concept of 'Risk' within the realm of information security, we'll demystify what risk is, elaborating its definition in the context of information security. Additionally, this section covers the key elements of risk assessment, helping you understand the vital role risk assessment plays in any cybersecurity strategy. Finally, we discuss the process of risk management, emphasizing its cyclical nature, and illustrating how continual re-evaluation and management of risks is critical in maintaining robust security.
涵盖的内容
9个视频1篇阅读材料3个作业1个讨论话题
This section sets the foundation of the course by defining and dissecting the concept of information systems. It explores the key elements that make up the framework of an information system. We'll guide you through the journey of Information System development using the Systems Development Life Cycle (SDLC) process. You'll learn about the various components that make up the SDLC process, understanding their role and importance in the development cycle. Also, you will acquire a robust understanding of security threats, attacks, and vulnerabilities, key terminologies in the world of information security. By identifying and categorizing different types of threats, you'll learn to understand the threat landscape that information systems face. We'll also delve into understanding the perpetrators of these threats - the attackers and uncover common attack types or methods that they employ. This understanding forms a crucial part of developing robust defenses for information systems.
涵盖的内容
7个视频4个作业
In this crucial section, we explore the concept of the 'weakest link' in information security and the importance of security awareness training in strengthening this link. You'll be introduced to the various common and effective attacks that exploit human vulnerabilities, often considered as the 'weakest link' in security. We delve into the realm of social engineering and explain manipulative tactics such as phishing, smishing, and vishing. Additionally, this section will guide you through the requirements for conducting effective security awareness training within an organization. You will also understand the importance of Access Controls and the Physical security realm in regard to information security. Remember when you configure something very secure, it does not mean that an attacker cannot simply physically unplug the cable.
涵盖的内容
8个视频3个作业
In this introductory section to cryptography, we embark on an exciting journey to understand its basic concepts and historical context. You'll learn the fundamental terminology used in cryptography and understand the all-important concept of encryption, the process of converting information into code to prevent unauthorized access. We will also explore in detail the concepts of symmetric and asymmetric encryption and learn about hashing and Public Key Infrastructure (PKI). All these concepts play a vital role in protecting information in the digital world. Moreover, you'll also learn about some of the most well-known attacks on cryptography. And lastly, we will shift our focus to practical applications of cryptography in everyday life. We'll discuss how cryptography is used in various scenarios such as internet banking and cryptocurrencies like Bitcoin.
涵盖的内容
7个视频4个作业
In this section, we will dive into three essential frameworks in the realm of information security - GDPR (General Data Protection Regulation), NIST CSF (National Institute of Standards and Technology’s Cybersecurity Framework), and ISO 27001 (Information Security Management System). You'll learn to define each framework and comprehend its unique features and applications. We'll also go through some basic questions and answers on each subject to ensure you have a comprehensive understanding of these frameworks and how they contribute to the security landscape. You will also learn what an Information Security Policy is, and the critical steps involved in creating one for your organization. Furthermore, we'll cover the importance of having such a policy in place, emphasizing its role in establishing guidelines and standards for handling and securing information. Lastly, the section concludes with a discussion on the importance of regular policy review and revisions to keep it up-to-date and effective.
涵盖的内容
5个视频3个作业
Concluding the course with the instructor’s final thoughts and potential suggestions about where to go further with your studies. Also, we will cover one of the most important things in Information Security – Passwords.
涵盖的内容
2个视频
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方
从 Security 浏览更多内容
- 状态:免费试用
- 状态:预览
University of London
- 状态:免费试用
- 状态:免费试用
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
更多问题
提供助学金,