The Information Security Fundamentals course provides a comprehensive introduction to the essential concepts and practices of information security. Learners will understand the importance of information security for the functionality of information systems and learn how to approach and recognize common threats and vulnerabilities. The course covers key elements such as confidentiality, integrity, and availability (CIA Triad), cryptography basics, and the role of technical standards in supplementing legal and regulatory requirements. By the end of this course, learners will be able to grasp fundamental security concepts, follow the tensions between information security and privacy, and simplify technical communications for the C-suite

Faites décoller votre carrière cet été grâce à des cours dispensés par Google, IBM et bien d'autres, pour 190 €/an. Économisez maintenant.


Information Security Fundamentals
Ce cours fait partie de Information Security Analyst Certificat Professionnel

Instructeur : EC-Council
Inclus avec
Expérience recommandée
Ce que vous apprendrez
Learn fundamental security concepts.
Understand the importance of Information Security for the functionality of the Information System.
Learn how to approach and recognize common threats and vulnerabilities in regard to Information Security.
Compétences que vous acquerrez
- Catégorie : ISO/IEC 27001
- Catégorie : Risk Management Framework
- Catégorie : Security Awareness
- Catégorie : Cybersecurity
- Catégorie : Cyber Security Policies
- Catégorie : Vulnerability Assessments
- Catégorie : General Data Protection Regulation (GDPR)
- Catégorie : Security Controls
- Catégorie : Information Systems
- Catégorie : Systems Development Life Cycle
- Catégorie : Encryption
- Catégorie : Cryptography
- Catégorie : Cyber Attacks
- Catégorie : Computer Security
- Catégorie : Network Security
- Catégorie : Infrastructure Security
- Catégorie : Human Factors (Security)
- Catégorie : Threat Detection
Détails à connaître

Ajouter à votre profil LinkedIn
juillet 2025
17 devoirs
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées

Élaborez votre expertise en Security
- Apprenez de nouveaux concepts auprès d'experts du secteur
- Acquérez une compréhension de base d'un sujet ou d'un outil
- Développez des compétences professionnelles avec des projets pratiques
- Obtenez un certificat professionnel partageable auprès de EC-Council

Il y a 6 modules dans ce cours
In this section, we dive into the fundamentals of information security and cybersecurity. We'll begin by elucidating the basic definitions and explore the crucial relationship between these two concepts. Furthermore, we delve into the core principles of information security, often referred to as the CIA triad – Confidentiality, Integrity, and Availability. Real-world examples will be used to illustrate these principles, helping you understand their importance in maintaining a secure information environment. Also, since this section focuses on the concept of 'Risk' within the realm of information security, we'll demystify what risk is, elaborating its definition in the context of information security. Additionally, this section covers the key elements of risk assessment, helping you understand the vital role risk assessment plays in any cybersecurity strategy. Finally, we discuss the process of risk management, emphasizing its cyclical nature, and illustrating how continual re-evaluation and management of risks is critical in maintaining robust security.
Inclus
9 vidéos1 lecture3 devoirs1 sujet de discussion
This section sets the foundation of the course by defining and dissecting the concept of information systems. It explores the key elements that make up the framework of an information system. We'll guide you through the journey of Information System development using the Systems Development Life Cycle (SDLC) process. You'll learn about the various components that make up the SDLC process, understanding their role and importance in the development cycle. Also, you will acquire a robust understanding of security threats, attacks, and vulnerabilities, key terminologies in the world of information security. By identifying and categorizing different types of threats, you'll learn to understand the threat landscape that information systems face. We'll also delve into understanding the perpetrators of these threats - the attackers and uncover common attack types or methods that they employ. This understanding forms a crucial part of developing robust defenses for information systems.
Inclus
7 vidéos4 devoirs
In this crucial section, we explore the concept of the 'weakest link' in information security and the importance of security awareness training in strengthening this link. You'll be introduced to the various common and effective attacks that exploit human vulnerabilities, often considered as the 'weakest link' in security. We delve into the realm of social engineering and explain manipulative tactics such as phishing, smishing, and vishing. Additionally, this section will guide you through the requirements for conducting effective security awareness training within an organization. You will also understand the importance of Access Controls and the Physical security realm in regard to information security. Remember when you configure something very secure, it does not mean that an attacker cannot simply physically unplug the cable.
Inclus
8 vidéos3 devoirs
In this introductory section to cryptography, we embark on an exciting journey to understand its basic concepts and historical context. You'll learn the fundamental terminology used in cryptography and understand the all-important concept of encryption, the process of converting information into code to prevent unauthorized access. We will also explore in detail the concepts of symmetric and asymmetric encryption and learn about hashing and Public Key Infrastructure (PKI). All these concepts play a vital role in protecting information in the digital world. Moreover, you'll also learn about some of the most well-known attacks on cryptography. And lastly, we will shift our focus to practical applications of cryptography in everyday life. We'll discuss how cryptography is used in various scenarios such as internet banking and cryptocurrencies like Bitcoin.
Inclus
7 vidéos4 devoirs
In this section, we will dive into three essential frameworks in the realm of information security - GDPR (General Data Protection Regulation), NIST CSF (National Institute of Standards and Technology’s Cybersecurity Framework), and ISO 27001 (Information Security Management System). You'll learn to define each framework and comprehend its unique features and applications. We'll also go through some basic questions and answers on each subject to ensure you have a comprehensive understanding of these frameworks and how they contribute to the security landscape. You will also learn what an Information Security Policy is, and the critical steps involved in creating one for your organization. Furthermore, we'll cover the importance of having such a policy in place, emphasizing its role in establishing guidelines and standards for handling and securing information. Lastly, the section concludes with a discussion on the importance of regular policy review and revisions to keep it up-to-date and effective.
Inclus
5 vidéos3 devoirs
Concluding the course with the instructor’s final thoughts and potential suggestions about where to go further with your studies. Also, we will cover one of the most important things in Information Security – Passwords.
Inclus
2 vidéos
Obtenez un certificat professionnel
Ajoutez ce titre à votre profil LinkedIn, à votre curriculum vitae ou à votre CV. Partagez-le sur les médias sociaux et dans votre évaluation des performances.
Instructeur

Offert par
En savoir plus sur Security
- Statut : Essai gratuit
University of London
- Statut : Essai gratuit
- Statut : Essai gratuit
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?





Ouvrez de nouvelles portes avec Coursera Plus
Accès illimité à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.
Faites progresser votre carrière avec un diplôme en ligne
Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne
Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires
Améliorez les compétences de vos employés pour exceller dans l’économie numérique
Foire Aux Questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
Plus de questions
Aide financière disponible,