5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Security Essentials for Decision-makers and Leaders     Security Essentials - Track 1: Becoming Security Aware

With information security a key concern for organizations, it is important to understand the basic concepts of information security and the security concepts that fall within this topic, such as those within the world of cybersecurity.


In this course, you'll recall information security fundamentals before examining the broad domains within it. You'll then delve into cybersecurity and explore the various approaches to it.


In addition, you'll examine some practical cybersecurity concepts, such as the CIA triad and the security architecture principle. You'll then investigate the actions that expose us to security risks, the roles we play in maintaining or breaching security, and the various security controls that can be implemented to mitigate security-related risks.



Objectives

Cybersecurity Awareness: Information Security Fundamentals

  • discover the key concepts covered in this course
  • recall what is meant by information security, what it protects, and how it protects it
  • use case studies and examples to illustrate what can happen when information is not protected
  • list the domains into which various types of information security can be categorized
  • describe the purpose and importance of cybersecurity and outline the cybersecurity framework
  • describe the various types of approaches to cybersecurity
  • describe the CIA triad and its importance and outline some cybersecurity confidentiality concepts
  • describe the integrity concepts of the CIA Triad
  • describe the availability concepts of the CIA Triad
  • discuss the CIA impacts and methods
  • define the function of security architecture and name related frameworks
  • define the purpose of security controls and name security control methods
  • classify and describe different types of security controls
  • describe examples of risks that can occur to anyone in any situation as well as those that expose organization's to security risks
  • define the role of humans in protecting the security of information
  • summarize the key concepts covered in this course