1. Home
  2. Training Library
  3. Security
  4. Courses
  5. IT Security Fundamentals

IT Security Fundamentals

Developed with
QA

Contents

keyboard_tab
Introduction
Overview
Difficulty
Beginner
Duration
1h 32m
Students
269
Ratings
4.4/5
starstarstarstarstar-half
Description

Please note: this course has now been refactored into a learning path, which you can find here.

***

This is a beginner-level course designed to provide you with an introduction to Information technology security concepts. The course will suit anyone interested in understanding the fundamentals of security concepts from a business and technology perspective.  

Learning Objectives

In this course we will provide:

  • An introduction to the concept of Information Security
  • We will cover the basic concepts that pertain to Information Security
  • We then begin to answer the question - what is information security and why do we need it?
  • We then explore some of the frameworks, controls and activities we can implement to control information security 

Intended Audience

This course is intended for anyone who wants to learn the fundamentals of IT security.

Prerequisites

This is a beginner level course where having a basic understanding of computing concepts will be useful 

Feedback 

Please reach out to us at support@cloudacademy.com with any questions, comments or feedback. 

 

Transcript

Hello and welcome to IT Security Fundamentals. This is a beginner-level course designed to provide you with an introduction to Information technology security concepts. The course will suit anyone interested in understanding the fundamentals of security concepts from a business and technology perspective. 

About the Author
Avatar
King Samuel
Cyber Security Trainer
Students
2614
Courses
12
Learning Paths
4

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.

Covered Topics