EC-Council
Information Security Fundamentals

Heat up your career this summer with courses from Google, IBM, and more for £190/year. Save now.

EC-Council

Information Security Fundamentals

EC-Council

Instructor: EC-Council

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

9 hours to complete
3 weeks at 3 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

9 hours to complete
3 weeks at 3 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Learn fundamental security concepts.

  • Understand the importance of Information Security for the functionality of the Information System.

  • Learn how to approach and recognize common threats and vulnerabilities in regard to Information Security.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

July 2025

Assessments

17 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your Security expertise

This course is part of the Information Security Analyst Professional Certificate
When you enroll in this course, you'll also be enrolled in this Professional Certificate.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate from EC-Council

There are 6 modules in this course

In this section, we dive into the fundamentals of information security and cybersecurity. We'll begin by elucidating the basic definitions and explore the crucial relationship between these two concepts. Furthermore, we delve into the core principles of information security, often referred to as the CIA triad – Confidentiality, Integrity, and Availability. Real-world examples will be used to illustrate these principles, helping you understand their importance in maintaining a secure information environment. Also, since this section focuses on the concept of 'Risk' within the realm of information security, we'll demystify what risk is, elaborating its definition in the context of information security. Additionally, this section covers the key elements of risk assessment, helping you understand the vital role risk assessment plays in any cybersecurity strategy. Finally, we discuss the process of risk management, emphasizing its cyclical nature, and illustrating how continual re-evaluation and management of risks is critical in maintaining robust security.

What's included

9 videos1 reading3 assignments1 discussion prompt

This section sets the foundation of the course by defining and dissecting the concept of information systems. It explores the key elements that make up the framework of an information system. We'll guide you through the journey of Information System development using the Systems Development Life Cycle (SDLC) process. You'll learn about the various components that make up the SDLC process, understanding their role and importance in the development cycle. Also, you will acquire a robust understanding of security threats, attacks, and vulnerabilities, key terminologies in the world of information security. By identifying and categorizing different types of threats, you'll learn to understand the threat landscape that information systems face. We'll also delve into understanding the perpetrators of these threats - the attackers and uncover common attack types or methods that they employ. This understanding forms a crucial part of developing robust defenses for information systems.

What's included

7 videos4 assignments

In this crucial section, we explore the concept of the 'weakest link' in information security and the importance of security awareness training in strengthening this link. You'll be introduced to the various common and effective attacks that exploit human vulnerabilities, often considered as the 'weakest link' in security. We delve into the realm of social engineering and explain manipulative tactics such as phishing, smishing, and vishing. Additionally, this section will guide you through the requirements for conducting effective security awareness training within an organization. You will also understand the importance of Access Controls and the Physical security realm in regard to information security. Remember when you configure something very secure, it does not mean that an attacker cannot simply physically unplug the cable.

What's included

8 videos3 assignments

In this introductory section to cryptography, we embark on an exciting journey to understand its basic concepts and historical context. You'll learn the fundamental terminology used in cryptography and understand the all-important concept of encryption, the process of converting information into code to prevent unauthorized access. We will also explore in detail the concepts of symmetric and asymmetric encryption and learn about hashing and Public Key Infrastructure (PKI). All these concepts play a vital role in protecting information in the digital world. Moreover, you'll also learn about some of the most well-known attacks on cryptography. And lastly, we will shift our focus to practical applications of cryptography in everyday life. We'll discuss how cryptography is used in various scenarios such as internet banking and cryptocurrencies like Bitcoin.

What's included

7 videos4 assignments

In this section, we will dive into three essential frameworks in the realm of information security - GDPR (General Data Protection Regulation), NIST CSF (National Institute of Standards and Technology’s Cybersecurity Framework), and ISO 27001 (Information Security Management System). You'll learn to define each framework and comprehend its unique features and applications. We'll also go through some basic questions and answers on each subject to ensure you have a comprehensive understanding of these frameworks and how they contribute to the security landscape. You will also learn what an Information Security Policy is, and the critical steps involved in creating one for your organization. Furthermore, we'll cover the importance of having such a policy in place, emphasizing its role in establishing guidelines and standards for handling and securing information. Lastly, the section concludes with a discussion on the importance of regular policy review and revisions to keep it up-to-date and effective.

What's included

5 videos3 assignments

Concluding the course with the instructor’s final thoughts and potential suggestions about where to go further with your studies. Also, we will cover one of the most important things in Information Security – Passwords.

What's included

2 videos

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

EC-Council
EC-Council
7 Courses83,882 learners

Offered by

EC-Council

Explore more from Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions