Current Status

Not Enrolled

Price

Closed

Get Started

This khoá học is currently closed

This course is designed for new graduates, employees, and professionals who want to understand the fundamentals of information security in the digital age. It covers key security principles such as the CIA Triad (Confidentiality, Integrity, Availability), introduces common types of threats and attacks, and explores preventive measures and legal considerations. 

In today’s interconnected world, security breaches can lead to data loss, financial damage, and reputational harm. Whether you’re working in IT, handling sensitive data, or simply using workplace systems, understanding how to prevent, detect, and respond to security risks is essential to protect both personal and organizational assets. 

How will this course help you? 

Through engaging lessons and real-world examples, this course will help you: 

  • Grasp foundational concepts of information security 
  • Recognize internal and external threats, from human error to software attacks 
  • Understand the ethical and legal aspects of cybersecurity 
  • Apply deterrence strategies to prevent unethical or illegal actions 
  • Manage information security risks in a workplace context 

After learning this course, you will be able to: 

  • Explain the core principles of the CIA Triad and its practical application 
  • Identify various threats and vulnerabilities in information systems 
  • Apply ethical decision-making in cybersecurity situations 
  • Understand how laws and regulations relate to information security 
  • Contribute to your organization’s information security management efforts 

Version available: English

Khoá học Content

Welcome to Information Security Training
Introduction To Security
The C.I.A Triad
The C.I.A Triad Expansion
Threats Introduction
Compromises to Intellectual Property (IP)
Deviations in Quality of Service
Espionage or Trespass
Forces of Nature
Human Error or Failure
Information Extortion
Sabotage or Vandalism
Software Attacks
Technical Hardware Failures or Errors
Technical Software Failures or Errors
Technological Obsolescence
Theft
Ethics in Information Security
Deterring Unethical and Illegal Behavior
Deterrence: Preventing Illegal or Unethical Acts​
1 of 2
Chat Icon
error: Content is protected !!