Information Security Fundamentals Online Training

    Taught by
    UPDATED: May 26, 2022
    Beginner
    Virtual Labs

    This Information Security Fundamentals training introduces aspiring IT professionals to key concepts like triple-A principles, password best practices, and balancing confidentiality with availability. Learn the basics of information security, gain essential vocabulary, and prepare for further IT security roles in this security fundamentals course. This CompTIA training can be used to onboard new or aspiring IT professionals, curated into individual or team training plans, or as a CompTIA reference resource.

    Start a free week

    Subscription options

    $59.00

    Access all premium content with a free week!

    • Quizzes
    • CyberVista® IT practice exams
    • Coaching
    • IT learner community
    Start a free week

    What you'll learn

    • Thinking with and recognizing confidentiality, integrity and availability concerns
    • Securing devices and naming device use best practices
    • Summarizing behavioral security concepts
    • Discussing authentication, authorization and accounting concepts
    • Explaining password and encryption best practices

    FAQs

    What is information security and how is it different from other kinds of security?

    Information security is the collection of all the technologies and processes that go into protecting sensitive data from unauthorized access. There are other kinds of security and other ways to think about securing valuable information, but information security is specifically focused on the confidentiality, integrity and availability of digital information. Information security is an umbrella term that usually includes processes and techniques related to encryption, access controls and digital security policies.

    What are the key fundamentals of information security?

    It's generally agreed that the key fundamentals of information security are confidentiality, integrity, availability, authentication and authorization. These five concepts work together so that data and information is kept protected from unwanted access, that the data is reliably (and verifiably) accurate, that users can access and use what they need, that users' identities are verified, and that the right level of access is given to the users who need it.

    What are the 5 types of security?

    Different sources will categorize and explain security differently, but there are usually five types of security: physical, information, network, application, and operational. These five types can help you think about how valuable information and assets are kept secure. A little like a zooming focus on a camera, you start with the physical space and objects, then the data integrity itself, followed by the network, the apps, and finally processes and procedures.

    Who is this introductory information security course good for?

    Anyone and everyone who uses computers, networks and information that's even a little bit sensitive should take this introductory information security training. This course is as good for future network security engineers as it is for accountants who only use Excel. Everyone in an organization is equally responsible for maintaining the basics of information security, and the easiest way to fail is not to know them in the first place.

    Is this information security fundamentals course associated with any certifications?

    No, rather than force you to memorize specifics or learn highly specialized vocabulary for a test, this course is focused on the broad and general concepts related to information security that would be applicable in any setting. There are excellent, entry-level security certifications that you could consider after taking this information security fundamentals course, like the Security+ cert from CompTIA, Cisco's CCST Cybersecurity, or Fortinet Certified Fundamentals Cybersecurity.

    Who is this for?

    This security training is considered foundational-level CompTIA training, which means it was designed for non-technical professionals or aspiring IT professionals with no experience at all.

    target-audience-face-1target-audience-face-8target-audience-face-9

    What our learners say

    • CBT Nuggets fits into my day-to-day amazingly.

      John M. | IT Manager
    • CBT Nuggets is exactly what I needed.

      Thomas S. | Systems Engineer & Consultant
    • Awesome, Top notch, I am super excited and thankful for CBT Nuggets. I am starting to get addicted to CBT Nuggets. I hope that there's no cure!!!

      Mike M. | CBTN Learner
    Study plan

    Download the free Information Security Fundamentals Online Training study plan to complete this course in about 6 hours.

    Download study plan

    Related Topics

    Get CBT Nuggets IT training news and resources

    I have read and understood the privacy policy and am able to consent to it.

    © 2025 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522