The Information Security Fundamentals course provides a comprehensive introduction to the essential concepts and practices of information security. Learners will understand the importance of information security for the functionality of information systems and learn how to approach and recognize common threats and vulnerabilities. The course covers key elements such as confidentiality, integrity, and availability (CIA Triad), cryptography basics, and the role of technical standards in supplementing legal and regulatory requirements. By the end of this course, learners will be able to grasp fundamental security concepts, follow the tensions between information security and privacy, and simplify technical communications for the C-suite

Heat up your career with 40% off top courses from Google, Adobe, and more. Save today.


Information Security Fundamentals
This course is part of Information Security Analyst Professional Certificate

Instructor: EC-Council
Included with
Recommended experience
What you'll learn
Learn fundamental security concepts.
Understand the importance of Information Security for the functionality of the Information System.
Learn how to approach and recognize common threats and vulnerabilities in regard to Information Security.
Skills you'll gain
- ISO/IEC 27001
- Risk Management Framework
- Security Awareness
- Cybersecurity
- Cyber Security Policies
- Vulnerability Assessments
- General Data Protection Regulation (GDPR)
- Security Controls
- Information Systems
- Systems Development Life Cycle
- Encryption
- Cryptography
- Cyber Attacks
- Computer Security
- Network Security
- Infrastructure Security
- Human Factors (Security)
- Threat Detection
Details to know

Add to your LinkedIn profile
July 2025
17 assignments
See how employees at top companies are mastering in-demand skills

Build your Security expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from EC-Council

There are 6 modules in this course
In this section, we dive into the fundamentals of information security and cybersecurity. We'll begin by elucidating the basic definitions and explore the crucial relationship between these two concepts. Furthermore, we delve into the core principles of information security, often referred to as the CIA triad – Confidentiality, Integrity, and Availability. Real-world examples will be used to illustrate these principles, helping you understand their importance in maintaining a secure information environment. Also, since this section focuses on the concept of 'Risk' within the realm of information security, we'll demystify what risk is, elaborating its definition in the context of information security. Additionally, this section covers the key elements of risk assessment, helping you understand the vital role risk assessment plays in any cybersecurity strategy. Finally, we discuss the process of risk management, emphasizing its cyclical nature, and illustrating how continual re-evaluation and management of risks is critical in maintaining robust security.
What's included
9 videos1 reading3 assignments1 discussion prompt
This section sets the foundation of the course by defining and dissecting the concept of information systems. It explores the key elements that make up the framework of an information system. We'll guide you through the journey of Information System development using the Systems Development Life Cycle (SDLC) process. You'll learn about the various components that make up the SDLC process, understanding their role and importance in the development cycle. Also, you will acquire a robust understanding of security threats, attacks, and vulnerabilities, key terminologies in the world of information security. By identifying and categorizing different types of threats, you'll learn to understand the threat landscape that information systems face. We'll also delve into understanding the perpetrators of these threats - the attackers and uncover common attack types or methods that they employ. This understanding forms a crucial part of developing robust defenses for information systems.
What's included
7 videos4 assignments
In this crucial section, we explore the concept of the 'weakest link' in information security and the importance of security awareness training in strengthening this link. You'll be introduced to the various common and effective attacks that exploit human vulnerabilities, often considered as the 'weakest link' in security. We delve into the realm of social engineering and explain manipulative tactics such as phishing, smishing, and vishing. Additionally, this section will guide you through the requirements for conducting effective security awareness training within an organization. You will also understand the importance of Access Controls and the Physical security realm in regard to information security. Remember when you configure something very secure, it does not mean that an attacker cannot simply physically unplug the cable.
What's included
8 videos3 assignments
In this introductory section to cryptography, we embark on an exciting journey to understand its basic concepts and historical context. You'll learn the fundamental terminology used in cryptography and understand the all-important concept of encryption, the process of converting information into code to prevent unauthorized access. We will also explore in detail the concepts of symmetric and asymmetric encryption and learn about hashing and Public Key Infrastructure (PKI). All these concepts play a vital role in protecting information in the digital world. Moreover, you'll also learn about some of the most well-known attacks on cryptography. And lastly, we will shift our focus to practical applications of cryptography in everyday life. We'll discuss how cryptography is used in various scenarios such as internet banking and cryptocurrencies like Bitcoin.
What's included
7 videos4 assignments
In this section, we will dive into three essential frameworks in the realm of information security - GDPR (General Data Protection Regulation), NIST CSF (National Institute of Standards and Technology’s Cybersecurity Framework), and ISO 27001 (Information Security Management System). You'll learn to define each framework and comprehend its unique features and applications. We'll also go through some basic questions and answers on each subject to ensure you have a comprehensive understanding of these frameworks and how they contribute to the security landscape. You will also learn what an Information Security Policy is, and the critical steps involved in creating one for your organization. Furthermore, we'll cover the importance of having such a policy in place, emphasizing its role in establishing guidelines and standards for handling and securing information. Lastly, the section concludes with a discussion on the importance of regular policy review and revisions to keep it up-to-date and effective.
What's included
5 videos3 assignments
Concluding the course with the instructor’s final thoughts and potential suggestions about where to go further with your studies. Also, we will cover one of the most important things in Information Security – Passwords.
What's included
2 videos
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Explore more from Security
- Status: Free Trial
University of London
- Status: Free Trial
- Status: Free Trial
Why people choose Coursera for their career





Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
More questions
Financial aid available,