Cybersecurity Awareness: Information Security Fundamentals

Cybersecurity    |    Beginner
  • 16 videos | 1h 54m 12s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 519 users Rating 4.4 of 519 users (519)
With information security a key concern for organizations, it is important to understand the basic concepts of information security and the security concepts that fall within this topic, such as those within the world of cybersecurity. In this course, you'll recall information security fundamentals before examining the broad domains within it. You'll then delve into cybersecurity and explore the various approaches to it. In addition, you'll examine some practical cybersecurity concepts, such as the CIA triad and the security architecture principle. You'll then investigate the actions that expose us to security risks, the roles we play in maintaining or breaching security, and the various security controls that can be implemented to mitigate security-related risks

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recall what is meant by information security, what it protects, and how it protects it
    Use case studies and examples to illustrate what can happen when information is not protected
    List the domains into which various types of information security can be categorized
    Describe the purpose and importance of cybersecurity and outline the cybersecurity framework
    Describe the various types of approaches to cybersecurity
    Describe the cia triad and its importance and outline some cybersecurity confidentiality concepts
    Describe the integrity concepts of the cia triad
  • Describe the availability concepts of the cia triad
    Discuss the cia impacts and methods
    Define the function of security architecture and name related frameworks
    Define the purpose of security controls and name security control methods
    Classify and describe different types of security controls
    Describe examples of risks that can occur to anyone in any situation as well as those that expose organizations to security risks
    Define the role of humans in protecting the security of information
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 2s
    In this video, you will learn more about your instructor and the key concepts of this course. You will learn why security is a key concern for organizations. You will also learn the fundamentals of information security, the CIA triad, and security controls. FREE ACCESS
  • 6m 14s
    In this video, you will review what information security is. Information security is a set of practices that are used to protect information, data, and assets from unauthorized entities. It also helps protect data from unauthorized access and destruction of information.  The video also reviews the importance of information security. You'll learn that information security is not just about protecting information but also about countering threats.  FREE ACCESS
  • Locked
    3.  The Consequences of Poor Information Security
    10m 59s
    In this video, you will learn the consequences of poor information security. You will learn the need for security. You will talk about what information security does. The instructor will walk you through case studies and examples that illustrate what can happen when information is not protected.  FREE ACCESS
  • Locked
    4.  The Numerous Domains of Information Security
    3m 47s
    In this video, you will learn the multiple domains that fall under information security. You will take a look at the domains into which various types of information security can be categorized. Information security domains include physical security, network and infrastructure security, cybersecurity, mobile and wireless, and cloud security.  FREE ACCESS
  • Locked
    5.  Cybersecurity as a Domain of Information Security
    12m 24s
    In this video, you will learn how to describe the importance of cybersecurity. You will outline the cybersecurity framework. You will learn how important cybersecurity is in every organization. The video discusses how cybersecurity is used to protect digital assets, including hardware, software, networks, applications, and data. Cybersecurity is designed to prevent digital assets from crimes. It protects networks from APTs (advanced persistent threats). Cybersecurity is designed as an organization's first line of defense.  FREE ACCESS
  • Locked
    6.  Types of Cybersecurity Approaches
    4m 32s
    In this video, you will learn the different types of approaches to cybersecurity. There are three main approaches available. These are compliance-based, risk-based, and ad hoc-based.  You will learn that compliance-based security is considered the standard approach. Risk-based approaches rely on identifying the specific risks of an organization. Ad hoc-based approaches simply implement security with no criteria or thought.  FREE ACCESS
  • Locked
    7.  The CIA Triad – Confidentiality
    6m 6s
    In this video, you will learn the CIA Triad and its importance. The CIA Triad protects the confidentiality, integrity, and availability of data.  When speaking of confidentiality, this implies encryption and access controls protect data. Integrity protects from data and availability means legitimate, authorized users have access to data when needed.  FREE ACCESS
  • Locked
    8.  The CIA Triad – Integrity
    6m 52s
    In this video, you will learn the second principle of the CIA Triad. You will learn what integrity means in information security. When it comes to integrity, it means only those who are authorized can access and modify data. Without integrity, organizations cannot monitor the information itself and keep it from authorized alteration.  FREE ACCESS
  • Locked
    9.  The CIA Triad – Availability
    10m 58s
    In this video, you will learn the third principle of the CIA Triad. You will learn what availability. This means granting timely access to authorized individuals. This ensures those who need the information can get the information in a timely manner.  FREE ACCESS
  • Locked
    10.  CIA Impacts and Methods
    7m 26s
    In this video, you will learn more about the CIA Triad and its impact and methods. You will look at the CIA Triad's impact on hardware, software, and data. You will also look at the correct methods your organization should follow when following the CIA Triad.  FREE ACCESS
  • Locked
    11.  Security Architecture Frameworks
    5m 11s
    In this video, you’ll learn to define the function of security architecture. Every organization will have different reasons for implementing security architecture, and each one will have a different type of security architecture. However, even though they all have different architecture, they all have one goal. They want to secure their data in order to perform business operations.  You'll learn that security architecture depends on the layout and components of the organization and its connectivity.  FREE ACCESS
  • Locked
    12.  The Concept of Security Controls
    9m 22s
    In this video, you will learn about security controls. Security controls help mitigate risks. Not all security controls serve the same person. Security controls are also known as countermeasures or safeguards. They help organizations handle risks in different ways. They also help you protect different types of assets.  In this video, you will learn that there are both manual and automatic security control methods.  FREE ACCESS
  • Locked
    13.  Security Control Categories, Types, and Examples
    14m 15s
    In this video, you will classify and describe different types of security controls. Each category has a specific function. There are three types of security controls. These are administrative, technical, and physical.  First, you'll learn that administrative controls include things like training, recruitment, incident responses, and more.  You'll learn that technical controls include encryption, network authentication, access control lists, and more. And you'll discover that physical controls include surveillance cameras, fences, security guards, and more.    FREE ACCESS
  • Locked
    14.  Examples of Risk in Daily Life and Security
    4m 56s
    In this video, you will take a look at examples of risks in everyday life. You will learn more about situations that expose organizations to security risks.  FREE ACCESS
  • Locked
    15.  The Role of Humans in Information Security
    6m 41s
    In this video, you’ll learn humans are the weakest link in the security chain. This is because humans do tasks in different manners, while automation completes tasks in the same way every time. Many processes involve humans, so hackers look for those weaknesses.    You’ll learn that humans make up 95% of security breaches. You will also discover the mistakes humans make in information security, and what you can do to prevent mistakes.  FREE ACCESS
  • Locked
    16.  Course Summary
    2m 27s
    This course covered the basics of information security. You learned why information is so important. You learned why organizations need information security, the domains of information security, and the approaches to cybersecurity. The course also covered the CIA Triad, which is the foundation of security. The course taught you about security architecture. In the course, the instructor also spoke about your risks in daily life as well as the risks humans pose to security.   FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.4 of 46 users Rating 4.4 of 46 users (46)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 231 users Rating 4.4 of 231 users (231)
Rating 4.5 of 190 users Rating 4.5 of 190 users (190)
Rating 4.7 of 277 users Rating 4.7 of 277 users (277)