The Information Security Fundamentals course provides a comprehensive introduction to the essential concepts and practices of information security. Learners will understand the importance of information security for the functionality of information systems and learn how to approach and recognize common threats and vulnerabilities. The course covers key elements such as confidentiality, integrity, and availability (CIA Triad), cryptography basics, and the role of technical standards in supplementing legal and regulatory requirements. By the end of this course, learners will be able to grasp fundamental security concepts, follow the tensions between information security and privacy, and simplify technical communications for the C-suite



Information Security Fundamentals
Dieser Kurs ist Teil von Information Security Analyst (berufsbezogenes Zertifikat)

Dozent: EC-Council
Bei enthalten
Empfohlene Erfahrung
Was Sie lernen werden
Learn fundamental security concepts.
Understand the importance of Information Security for the functionality of the Information System.
Learn how to approach and recognize common threats and vulnerabilities in regard to Information Security.
Kompetenzen, die Sie erwerben
- Kategorie: ISO/IEC 27001
- Kategorie: Risk Management Framework
- Kategorie: Security Awareness
- Kategorie: Cybersecurity
- Kategorie: Cyber Security Policies
- Kategorie: Vulnerability Assessments
- Kategorie: General Data Protection Regulation (GDPR)
- Kategorie: Security Controls
- Kategorie: Information Systems
- Kategorie: Systems Development Life Cycle
- Kategorie: Encryption
- Kategorie: Cryptography
- Kategorie: Cyber Attacks
- Kategorie: Computer Security
- Kategorie: Network Security
- Kategorie: Infrastructure Security
- Kategorie: Human Factors (Security)
- Kategorie: Threat Detection
Wichtige Details

Zu Ihrem LinkedIn-Profil hinzufügen
Juli 2025
17 Aufgaben
Erfahren Sie, wie Mitarbeiter führender Unternehmen gefragte Kompetenzen erwerben.

Erweitern Sie Ihr Fachwissen im Bereich Security
- Lernen Sie neue Konzepte von Branchenexperten
- Gewinnen Sie ein Grundverständnis bestimmter Themen oder Tools
- Erwerben Sie berufsrelevante Kompetenzen durch praktische Projekte
- Erwerben Sie ein Berufszertifikat von EC-Council zur Vorlage

In diesem Kurs gibt es 6 Module
In this section, we dive into the fundamentals of information security and cybersecurity. We'll begin by elucidating the basic definitions and explore the crucial relationship between these two concepts. Furthermore, we delve into the core principles of information security, often referred to as the CIA triad – Confidentiality, Integrity, and Availability. Real-world examples will be used to illustrate these principles, helping you understand their importance in maintaining a secure information environment. Also, since this section focuses on the concept of 'Risk' within the realm of information security, we'll demystify what risk is, elaborating its definition in the context of information security. Additionally, this section covers the key elements of risk assessment, helping you understand the vital role risk assessment plays in any cybersecurity strategy. Finally, we discuss the process of risk management, emphasizing its cyclical nature, and illustrating how continual re-evaluation and management of risks is critical in maintaining robust security.
Das ist alles enthalten
9 Videos1 Lektüre3 Aufgaben1 Diskussionsthema
This section sets the foundation of the course by defining and dissecting the concept of information systems. It explores the key elements that make up the framework of an information system. We'll guide you through the journey of Information System development using the Systems Development Life Cycle (SDLC) process. You'll learn about the various components that make up the SDLC process, understanding their role and importance in the development cycle. Also, you will acquire a robust understanding of security threats, attacks, and vulnerabilities, key terminologies in the world of information security. By identifying and categorizing different types of threats, you'll learn to understand the threat landscape that information systems face. We'll also delve into understanding the perpetrators of these threats - the attackers and uncover common attack types or methods that they employ. This understanding forms a crucial part of developing robust defenses for information systems.
Das ist alles enthalten
7 Videos4 Aufgaben
In this crucial section, we explore the concept of the 'weakest link' in information security and the importance of security awareness training in strengthening this link. You'll be introduced to the various common and effective attacks that exploit human vulnerabilities, often considered as the 'weakest link' in security. We delve into the realm of social engineering and explain manipulative tactics such as phishing, smishing, and vishing. Additionally, this section will guide you through the requirements for conducting effective security awareness training within an organization. You will also understand the importance of Access Controls and the Physical security realm in regard to information security. Remember when you configure something very secure, it does not mean that an attacker cannot simply physically unplug the cable.
Das ist alles enthalten
8 Videos3 Aufgaben
In this introductory section to cryptography, we embark on an exciting journey to understand its basic concepts and historical context. You'll learn the fundamental terminology used in cryptography and understand the all-important concept of encryption, the process of converting information into code to prevent unauthorized access. We will also explore in detail the concepts of symmetric and asymmetric encryption and learn about hashing and Public Key Infrastructure (PKI). All these concepts play a vital role in protecting information in the digital world. Moreover, you'll also learn about some of the most well-known attacks on cryptography. And lastly, we will shift our focus to practical applications of cryptography in everyday life. We'll discuss how cryptography is used in various scenarios such as internet banking and cryptocurrencies like Bitcoin.
Das ist alles enthalten
7 Videos4 Aufgaben
In this section, we will dive into three essential frameworks in the realm of information security - GDPR (General Data Protection Regulation), NIST CSF (National Institute of Standards and Technology’s Cybersecurity Framework), and ISO 27001 (Information Security Management System). You'll learn to define each framework and comprehend its unique features and applications. We'll also go through some basic questions and answers on each subject to ensure you have a comprehensive understanding of these frameworks and how they contribute to the security landscape. You will also learn what an Information Security Policy is, and the critical steps involved in creating one for your organization. Furthermore, we'll cover the importance of having such a policy in place, emphasizing its role in establishing guidelines and standards for handling and securing information. Lastly, the section concludes with a discussion on the importance of regular policy review and revisions to keep it up-to-date and effective.
Das ist alles enthalten
5 Videos3 Aufgaben
Concluding the course with the instructor’s final thoughts and potential suggestions about where to go further with your studies. Also, we will cover one of the most important things in Information Security – Passwords.
Das ist alles enthalten
2 Videos
Erwerben Sie ein Karrierezertifikat.
Fügen Sie dieses Zeugnis Ihrem LinkedIn-Profil, Lebenslauf oder CV hinzu. Teilen Sie sie in Social Media und in Ihrer Leistungsbeurteilung.
Dozent

von
Mehr von Security entdecken
- Status: Kostenloser Testzeitraum
University of London
- Status: Kostenloser Testzeitraum
- Status: Kostenloser Testzeitraum
Warum entscheiden sich Menschen für Coursera für ihre Karriere?





Neue Karrieremöglichkeiten mit Coursera Plus
Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten
Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.
Erwerben Sie einen Abschluss von erstklassigen Universitäten – 100 % online
Schließen Sie sich mehr als 3.400 Unternehmen in aller Welt an, die sich für Coursera for Business entschieden haben.
Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.
Häufig gestellte Fragen
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
Weitere Fragen
Finanzielle Unterstützung verfügbar,