Information Security Fundamentals Online Training

    Taught by
    UPDATED: May 26, 2022
    Beginner
    Virtual Labs

    This Information Security Fundamentals training introduces aspiring IT professionals to key concepts like triple-A principles, password best practices, and balancing confidentiality with availability. Learn the basics of information security, gain essential vocabulary, and prepare for further IT security roles in this security fundamentals course. This CompTIA training can be used to onboard new or aspiring IT professionals, curated into individual or team training plans, or as a CompTIA reference resource.

    Start a free week

    Subscription options

    $59.00

    Access all premium content with a free week!

    • Quizzes
    • CyberVista® IT practice exams
    • Coaching
    • IT learner community
    Start a free week
    G2 Logo
    4.5 reviews stars

    What you'll learn

    • Thinking with and recognizing confidentiality, integrity and availability concerns
    • Securing devices and naming device use best practices
    • Summarizing behavioral security concepts
    • Discussing authentication, authorization and accounting concepts
    • Explaining password and encryption best practices

    FAQs

    What is information security and how is it different from other kinds of security?

    Information security is the collection of all the technologies and processes that go into protecting sensitive data from unauthorized access. There are other kinds of security and other ways to think about securing valuable information, but information security is specifically focused on the confidentiality, integrity and availability of digital information. Information security is an umbrella term that usually includes processes and techniques related to encryption, access controls and digital security policies.

    What are the key fundamentals of information security?

    It's generally agreed that the key fundamentals of information security are confidentiality, integrity, availability, authentication and authorization. These five concepts work together so that data and information is kept protected from unwanted access, that the data is reliably (and verifiably) accurate, that users can access and use what they need, that users' identities are verified, and that the right level of access is given to the users who need it.

    What are the 5 types of security?

    Different sources will categorize and explain security differently, but there are usually five types of security: physical, information, network, application, and operational. These five types can help you think about how valuable information and assets are kept secure. A little like a zooming focus on a camera, you start with the physical space and objects, then the data integrity itself, followed by the network, the apps, and finally processes and procedures.

    Who is this introductory information security course good for?

    Anyone and everyone who uses computers, networks and information that's even a little bit sensitive should take this introductory information security training. This course is as good for future network security engineers as it is for accountants who only use Excel. Everyone in an organization is equally responsible for maintaining the basics of information security, and the easiest way to fail is not to know them in the first place.

    Is this information security fundamentals course associated with any certifications?

    No, rather than force you to memorize specifics or learn highly specialized vocabulary for a test, this course is focused on the broad and general concepts related to information security that would be applicable in any setting. There are excellent, entry-level security certifications that you could consider after taking this information security fundamentals course, like the Security+ cert from CompTIA, Cisco's CCST Cybersecurity, or Fortinet Certified Fundamentals Cybersecurity.

    Who is this for?

    This security training is considered foundational-level CompTIA training, which means it was designed for non-technical professionals or aspiring IT professionals with no experience at all.

    target-audience-face-3target-audience-face-6target-audience-face-10

    What our learners say

    • You constantly have to invest in training for your people.

      Rick N. | CEO
    • Very easy and fun way to learn. Keith Barker is my favorite, he'll throw in jokes here and there and it makes me remember certain study points. I highly recommend this app and purchasing subscriptions, it is truly worth the money.

      Joshua E. | IT Systems Administrator
    • The more I put into learning, the more skills I’m going to have — and the better I’m going to be technically.

      Knox Hutchinson | CBT Nuggets trainer since 2018
    Study plan

    Download the free Information Security Fundamentals Online Training study plan to complete this course in about 6 hours.

    Download study plan

    Related Topics

    Get CBT Nuggets IT training news and resources

    I have read and understood the privacy policy and am able to consent to it.

    © 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522