Information Security Basic Skills you will learn

  • Security and risk management
  • Asset security Security architecture and design
  • Cryptography OSI and TCPIP models
  • IP addresses
  • Network security
  • Identity and access management
  • Security assessment and testing
  • Software development security

Who should learn Information Security Basics

  • IT Security Professionals
  • Security Consultants
  • IT Directors
  • Security Auditors
  • Security System Engineers
  • Network Architects
  • CIOs
  • Security Managers
  • IT Managers

What you will learn in Information Security Basics

  • CISSP® - Certified Information Systems Security Professional

    • Lesson 01 - Course Introduction

      11:49
      • Course Introduction
        11:49
    • Lesson 02 - Security and Risk Management

      03:08:49
      • 1.01 Security and Risk Management
        01:00
      • 1.02 Information Security Management
        15:26
      • 1.03 Security Controls
        06:06
      • 1.04 Information Security Management and Governance
        07:19
      • 1.05 Goals, Mission, and Objectives
        05:06
      • 1.06 Due Care
        14:41
      • 1.07 Security Policy
        08:18
      • 1.08 Compliance
        03:13
      • 1.09 Computer Crimes
        05:02
      • 1.10 Legal Systems
        08:09
      • 1.11 Intellectual Property (IP) Law
        08:02
      • 1.12 Privacy
        10:07
      • 1.13 General Data Protection Regulation
        05:03
      • 1.14 Security
        02:27
      • 1.15 Risk Analysis
        02:38
      • 1.16 Types of Risk Analysis
        22:35
      • 1.17 Security Control Assessment
        03:33
      • 1.18 Threat Modeling
        11:17
      • 1.19 Supply-Chain Risk Management
        03:34
      • 1.20 Third-Party Management
        12:06
      • 1.21 Business Continuity Planning
        02:19
      • 1.22 Business Continuity Planning Phases
        14:29
      • 1.23 Managing Personnel Security
        08:42
      • 1.24 Security Awareness Training
        03:16
      • 1.25 Program Effectiveness Evaluation
        03:44
      • 1.26 Key Takeaways
        00:37
      • Knowledge Check
    • Lesson 03 - Asset Security

      50:15
      • 2.01 Asset Security
        01:06
      • 2.02 Information Classification
        07:51
      • 2.03 Data Classification
        03:17
      • 2.04 Data Life Cycle
        03:42
      • 2.05 Data Management
        03:26
      • 2.06 Different Roles
        02:42
      • 2.07 Data Remanence
        05:08
      • 2.08 Privacy
        10:45
      • 2.09 States of Data
        07:56
      • 2.10 Data Loss Prevention
        03:43
      • 2.11 Key Takeaways
        00:39
      • Knowledge Check
    • Lesson 04 - Security Engineering

      03:06:27
      • 3.01 Introduction
        00:54
      • 3.02 Security Engineering
        15:29
      • 3.03 Security Architecture
        04:04
      • 3.04 Security Models
        18:22
      • 3.05 Evaluation Criteria
        13:23
      • 3.06 System Security
        02:49
      • 3.07 CPU
        07:06
      • 3.08 Memory
        07:51
      • 3.09 Security Mode
        07:27
      • 3.10 Cloud Computing
        13:58
      • 3.11 IOT
        03:28
      • 3.12 Industrial Control System (ICS)
        12:17
      • 3.13 Cryptography
        12:17
      • 3.14 Encryption Methods
        05:39
      • 3.15 DES
        10:55
      • 3.16 Asymmetric Cryptography
        10:11
      • 3.17 Public Key Infrastructure
        12:24
      • 3.18 Cryptanalysis
        02:10
      • 3.19 Key Management
        04:28
      • 3.20 Critical Path Analysis
        03:12
      • 3.21 Site Location
        06:50
      • 3.22 Fire
        08:48
      • 3.23 HVAC
        02:02
      • 3.24 Key Takeaways
        00:23
      • Knowledge Check
    • Lesson 05 - Communications and Network Security

      02:51:48
      • 4.01 Introduction
        01:00
      • 4.02 Network Architecture and Design
        21:17
      • 4.03 IP Addressing
        25:37
      • 4.04 Network Protocols
        15:43
      • 4.05 Transmission Media
        21:45
      • 4.06 Firewall
        08:20
      • 4.07 Intrusion Detection System and Intrusion Prevention System
        03:09
      • 4.08 Network Access Control (NAC)
        04:16
      • 4.09 Content Delivery Network (CDN)
        04:18
      • 4.10 Networks
        06:30
      • 4.11 Software-Defined Networking (SDN)
        01:49
      • 4.12 Remote Access
        04:17
      • 4.13 Internet Security Protocol (IPsec)
        14:24
      • 4.14 Voice over Internet Protocol (VoIP)
        02:53
      • 4.15 Phreaking
        01:42
      • 4.16 Secure Access Protocols
        05:35
      • 4.17 Wireless Technologies
        19:23
      • 4.18 Network Attacks
        09:24
      • 4.19 Key Takeaways
        00:26
      • Knowledge Check
    • Lesson 06 - Identity and Access Management

      01:48:39
      • 5.01 Identity and Access Management
        00:58
      • 5.02 Identity and Access Management
        03:54
      • 5.03 Identity Management
        10:20
      • 5.04 Biometrics
        03:57
      • 5.05 Passwords
        08:56
      • 5.06 Tokens
        04:37
      • 5.07 Memory Cards and Smart Cards
        05:56
      • 5.08 Access and Authorization Concepts
        06:15
      • 5.09 Identity Management Implementation
        10:10
      • 5.10 Kerberos
        04:19
      • 5.11 Access Control Types
        04:57
      • 5.12 Access Control Models
        07:29
      • 5.13 Access Control Tools and Techniques
        10:51
      • 5.14 Accountability
        03:37
      • 5.15 Access Control Monitoring
        03:35
      • 5.16 Identity Proofing
        05:02
      • 5.17 Markup Languages
        04:41
      • 5.18 Identity as a Service (IDaaS)
        08:37
      • 5.19 Key Takeaways
        00:28
      • Knowledge Check
    • Lesson 07 - Security Assessment and Testing

      01:16:38
      • 6.01 Security Assessment and Testing
        00:56
      • 6.02 Security Assessment
        01:01
      • 6.03 Vulnerability Assessment
        07:21
      • 6.04 Penetration Testing
        07:20
      • 6.05 Audits
        15:16
      • 6.06 Log Management
        07:13
      • 6.07 Synthetic Transaction and Real Transaction
        02:41
      • 6.08 Testing
        05:28
      • 6.09 Software Testing
        18:13
      • 6.10 Interface
        05:02
      • 6.11 Key Performance Indicators (KPI)
        05:35
      • 6.12 Key Takeaways
        00:32
      • Knowledge Check
    • Lesson 08 - Security Operations

      02:14:29
      • 7.01 Security Operations
        00:49
      • 7.02 Investigation
        05:41
      • 7.03 Forensic Investigation
        04:19
      • 7.04 Evidence
        07:29
      • 7.05 Electronic Discovery
        03:05
      • 7.06 Incident Management
        07:30
      • 7.07 Security Operations Management
        24:04
      • 7.08 Identity and Access Management
        10:08
      • 7.09 Assets
        11:50
      • 7.10 Malware
        02:12
      • 7.11 Management
        07:04
      • 7.12 Recovery and Backup
        24:56
      • 7.13 Disaster Recovery
        13:01
      • 7.14 Perimeter Security
        12:03
      • 7.15 Key Takeaways
        00:18
      • Knowledge Check
    • Lesson 09 - Software Development Security

      01:57:11
      • 8.01 Software Development Security
        01:03
      • 8.02 Importance of Software Development Security
        05:54
      • 8.03 Programming Concepts
        16:11
      • 8.04 Systems Development Life Cycle
        33:35
      • 8.05 Application Program Interface
        03:59
      • 8.06 Software Security and Assurance
        13:32
      • 8.07 Database and Data Warehouse Environments
        14:32
      • 8.08 Knowledge Management
        02:01
      • 8.09 Web Application Environment
        06:24
      • 8.10 Security Threats and Attacks
        19:28
      • 8.11 Key Takeaways
        00:32
      • Knowledge Check

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Course Advisors

  • Dean Pompilio

    Dean Pompilio

    Technical Trainer, Owner- Steppingstonesolutions Inc

    Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth.

prevNext

Why you should learn Information Security Basics

3.5 million jobs

in cyber security by 2021

$282 billion projected

Global cyber security market by 2024

Career Opportunities

FAQs

  • What are the requirements to learn the Introduction to Information Security program?

    Professionals are recommended to have prior work experience in fields like Security and Risk Management, Asset Security, Security Engineering, or other related fields before taking this Introduction to Information Security program.

  • How do beginners learn CISSP fundamentals?

    Information Security is one of the top career choices in the IT industry, and it is crucial to learn about this field from its foundations. Simplilearn helps you learn the CISSP fundamentals by offering various articles, YouTube videos, and tutorials that are suitable for beginners.

  • How long does it take to learn information security?

    Information Security is a vast domain and involves various aspects that you can start with. Our 18 hours of detailed video lectures covered in this Introduction to Information Security program give you the perfect start and you can learn it at your own pace.

  • What should I learn first in the Introduction to Information Security program?

    This Introduction to Information Security program begins with an overview of topics like Security and Risk Management, Information Security Management and Governance, and Network Architecture and Design.

  • Is the CISSP program easy to learn?

    If you don’t have prior knowledge of Information Security, then you may find it a bit difficult to grasp the concepts covered in this program. However, you can refer to our supported articles and tutorials on information security to get the basics right. 

  • What are the basics in an Introduction to Information Security training program?

    The basics covered in this Introduction to Information Security training program are Security, Privacy, Third-Party management, data loss prevention, security engineering, cryptanalysis, and IP addressing. 

  • What is information Security used for?

    Information security is all about the practice of protecting the information assets of an organization from all kinds of threat. It ensures that unauthorized individuals or entities do not get access to a company’s systems, servers, and other assets to manipulate the sensitive information they store. 

  • Can I complete this Introduction to Information Security program in 90 days?

    Yes, the concepts covered in this Introduction to Information Security program are quite straightforward, and you can complete the course well within 90 days.

  • What are my next best learning options after completing this CISSP program?

    After completing this CISSP training program, you can get ahead with other courses like Cyber Security Expert Master’s Program or Post Graduate Program in Cyber Security

  • What are the career opportunities in Information Security?

    Companies are seeking Information Security professionals like never before due to the alarming increase in the number of cyberattacks and the amount of financial losses they are bringing to the organization. Job roles like Information Security Analyst, Security Consultant, Security Architect, and Forensic Computer Analyst are popular career opportunities in this field. 

  • Will I get a certificate after completing the free CISSP® course?

    Yes, You will receive a Course Completion Certificate from SkillUp upon completing the free CISSP® course. You can unlock it by logging in to your SkillUp account. As soon as the certificate is unlocked, you will receive a mail with a link to your SkillUp learning dashboard on your registered mail address. Click the link to view and download your certificate. You can even add the certificate to your resume and share it on social media platforms.

  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.