- Level Foundation
- Duration 5 hours
- Course by ISC2
-
Offered by
About
Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the participant will be able to: Discuss the foundational concepts of cybersecurity principles. - Recognize foundational security concepts of information assurance. - Define risk management terminology and summarize the process. - Relate risk management to personal or professional practices. - Classify types of security controls. - Distinguish between policies, procedures, standards, regulations and laws. - Demonstrate the relationship among governance elements. - Analyze appropriate outcomes according to the canons of the (ISC)2 Code of Ethics when given examples. - Practice the terminology and review security principles. Agenda Course Introduction Module 1: Information Assurance Module 2: Risk Management Process Module 3: Security Controls Module 4: Governance Module 5: (ISC)2 Code of Ethics Module 6: Course Summary This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.Modules
Course Introduction
1
Videos
- Course Introduction
1
Readings
- Course Agenda
Information Assurance
1
Assignment
- Self Check: Security Concepts
3
Videos
- CIA Triads
- Identification
- Multifactor Authentication or Single Factor Authentication
8
Readings
- The CIA Triad
- CIA Triad Deep Dive: Confidentiality
- CIA Triad Deep Dive: Integrity
- CIA Triad Deep Dive: Availability
- Authentication
- Methods of Authentication
- Non-repudiation
- Privacy
Risk Mitigation Process
1
Assignment
- Self Check: Risk Terms
5
Videos
- Threats
- Vulnerabilities
- Likelihood
- Risk – Concepts and Definitions
- Risk Management
10
Readings
- Module Overview
- Risk Management Terminology
- Threats
- Vulnerabilities
- Likelihood
- Risk Identification
- Risk Assessment
- Risk Treatment
- Risk Priorities
- Risk Tolerance
Security Controls
1
Assignment
- Self Check: Security Controls
1
Videos
- Security Controls
4
Readings
- What are Security Controls?
- Physical Controls
- Technical Controls
- Administrative Controls
Governance
1
Videos
- Governance
5
Readings
- Governance Elements
- Governance Elements: Regulations and Laws
- Governance Elements: Standards
- Governance Elements: Policies
- Governance Elements: Procedures
(ISC)² Code of Ethics
1
Assignment
- Self Check: Applying the Code
1
Videos
- (ISC)² Code of Ethics
1
Readings
- Professional Code of Conduct
Security Principles Review
1
Assignment
- Security Concepts Quiz
1
Peer Review
- Peer Review
2
Videos
- Chapter Review
- Security Principles Quiz
2
Readings
- Course Summary
- Terms and Definitions
Auto Summary
"Security Principles" is a foundational IT and Computer Science course offered by Coursera, focusing on key cybersecurity concepts. Taught by experts, it covers information assurance, risk management, security controls, governance, and the (ISC)2 Code of Ethics over 300 minutes. Ideal for IT professionals, career changers, students, and graduates aiming for cybersecurity roles, it requires no prior experience. Subscription options include Starter and Professional tiers.

ISC2 Education & Training