learning path

IT Security Fundamentals

Beginner
Up to 2h 24m
2,688
4.8/5
Enhance your skill setDevelop essential skills for thriving in real-world scenarios.
Stay focused, stay committedBoost your learning journey by enrolling: stay focused, consistent and achieve your goals with ease.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.

This is a beginner-level course designed to provide you with an introduction to Information technology security concepts. 

During this course, you will get an introduction to the concept of Information Security and you'll learn the basic concepts that pertain to the subject.

We then begin to answer the question, "What is information security and why do we need it?" We'll explore some of the frameworks, controls, and activities we can implement to control information security and manage risk in our IT infrastructure.

We'll also cover how cyberattacks are carried out and the threat actors behind them. We then look at ways of counteracting attacks through the use of ethical testing, and how to cope with an attack by implementing an incident response strategy. To round off the course, we briefly touch upon GDPR principles.

Learning Objectives

  • Learn the fundamentals of information security and how it differs from information assurance
  • Learn about the CIA Triad
  • Understand the most common security frameworks in use today
  • Learn the basics of the ISO 27000 series framework
  • Key aspects of risk management including risk identification, risk mitigation, and risk controls
  • Obtain a foundational understanding of cyberattacks and cybersecurity
  • Learn the basics of GDPR 

Intended Audience

This course will suit anyone interested in understanding the fundamentals of security concepts from a business and technology perspective. 

Prerequisites

This is a beginner-level course on information security, so you didn't need any prior knowledge on the subject, but having a basic understanding of computing concepts would be beneficial. 

Feedback

If you have any feedback relating to this course, please get in touch with us at support@cloudacademy.com.

Your certificate for this learning path
QA
This content is developed in partnership with QA
Learn more

About the Author

Avatar
King Samuel, opens in a new tab
Cyber Security Trainer
Students
9,601
Courses
12
Learning paths
10

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.

Covered Topics