We may earn an affiliate commission when you visit our partners.
Course image
Keith Watson
There are many components to an organization's information security program. If you are new to cybersecurity or interested in getting started, it can be difficult to identify and understand all of the facets of protecting an organization's information assets. In this course, Introduction to Information Security, you will learn about the information security programs used by organizations. First, you will learn about the foundational principles of information security, such as confidentiality, integrity, governance, risk management, and compliance. Next, you will explore organizational assets and how they are protected through the...
Read more
There are many components to an organization's information security program. If you are new to cybersecurity or interested in getting started, it can be difficult to identify and understand all of the facets of protecting an organization's information assets. In this course, Introduction to Information Security, you will learn about the information security programs used by organizations. First, you will learn about the foundational principles of information security, such as confidentiality, integrity, governance, risk management, and compliance. Next, you will explore organizational assets and how they are protected through the use of security controls. Then, you will take a look at how auditing, monitoring, and testing is used to review and evaluate the effectiveness of those security controls. Finally, you will discover how organizations manage and prepare for security incidents, disruptions, and disasters and how they manage the day-to-day operations of an information security program. When you are finished with this course, you will have the knowledge and understanding of the bigger picture of information security.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Newcomers to the field and cybersecurity interested in getting started
Instructors Keith Watson whose reputation is unclear
Provides foundational principles, such as confidentiality, integrity, governance, risk management, and compliance
Covers protection of organizational assets and security controls used for that purpose
Explores how auditing, monitoring, and testing are used to evaluate effectiveness of security controls
Discusses security incident management, disaster preparedness, and daily operations of an information security program

Save this course

Save Introduction to Information Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Introduction to Information Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Introduction to Information Security will develop knowledge and skills that may be useful to these careers:
Incident Responder
An Incident Responder is responsible for responding to security incidents. This course provides a strong foundation for this role with its topics on incident management and disaster recovery. Incident management and disaster recovery are core responsibilities for someone in this field.
Security Architect
A Security Architect is responsible for designing and implementing an organization's security architecture. Many of the principles and practices in this course would be in the direct purview of this role. In order to design a secure and resilient architecture, an understanding of information security, organizational assets, and security controls are necessary. Implementing the architecture further requires knowledge of auditing, monitoring, testing, incident management, and disaster recovery.
Cybersecurity Engineer
A Cybersecurity Engineer is responsible for designing, implementing, and maintaining an organization's cybersecurity infrastructure. This course can help to prepare you for this career by providing a foundation in information security principles, organizational assets, security controls, auditing, monitoring, and testing. This course also covers topics such as incident management and disaster recovery, which are both important for a Cybersecurity Engineer to understand.
Risk Analyst
A Risk Analyst is responsible for identifying and assessing risks to an organization's information security program. A course in Information Security can help one be successful in this role by providing a foundation in the principles of information security governance, risk management, and compliance. Risk Analysts need to be familiar with all elements of an information security program and able to determine the likelihood and impact of those risks.
Information Security Auditor
An Information Security Auditor is responsible for auditing an organization's information security program. This course on Information Security can help to prepare for this role by providing knowledge of the different components of an information security program, as well as the principles of information security auditing. This course also covers topics such as auditing, monitoring, and testing, which are all important for an Information Security Auditor to understand.
Compliance Analyst
A Compliance Analyst is responsible for ensuring that an organization is compliant with applicable laws and regulations. This course provides a useful foundation of knowledge for an individual in this role, as understanding the principles of information security, governance, risk management, compliance, organizational assets, and security controls are key to ensuring that all requirements are met.
Security Analyst
A Security Analyst is responsible for monitoring and analyzing an organization's security systems for threats. The coursework in this Introduction to Information Security course provides a good foundation for this career as the person in this role will need to be familiar with the principles of information security, organizational assets, security controls, auditing, monitoring, and testing. An understanding of these topics will help in recognizing, understanding, and escalating threats found in an organization's security systems.
Privacy Analyst
A Privacy Analyst is responsible for ensuring that an organization collects, uses, and discloses personal information in accordance with applicable laws and regulations. This course can provide a foundation for this role by building an understanding of the principles of information security, governance, risk management, and compliance. This role, in many ways, is a more specialized version of a Compliance Analyst, but specifically in the realm of personally-identifiable information.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's information security program. This course in Introduction to Information Security will build a foundation of knowledge in this career, as managing an information security program requires knowledge of the principles of information security, organizational assets, security controls, auditing, monitoring, testing, incident management, and disaster recovery.
Security Consultant
A Security Consultant is responsible for providing security advice and guidance to organizations. This course is correlated to the role in that it builds a foundation in information security principles, organizational assets, security controls, auditing, monitoring, testing, incident management, and disaster recovery. Having a general awareness of these topics is important before being able to provide guidance to organizations on them.
Threat Intelligence Analyst
A Threat Intelligence Analyst is responsible for gathering and analyzing information about threats to an organization's information security. This course can provide a foundation for this role by building an understanding of the principles of information security, organizational assets, security controls, and incident management. A Threat Intelligence Analyst needs to understand these topics to help identify threats and develop strategies to mitigate them.
Penetration Tester
A Penetration Tester is responsible for testing an organization's security infrastructure for vulnerabilities. This course in Information Security may be useful in this role as it provides a foundation in information security principles, organizational assets, and security controls. This knowledge would serve as a foundation for testing the effectiveness of an organization's security infrastructure for vulnerabilities.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for overseeing an organization's information security program. This course may be useful to someone in this role as it provides an overview of the components of an information security program, including information security governance, risk management, and compliance. Having knowledge of these topics is essential for being able to effectively oversee an information security program, especially within a larger organization.
Digital Forensics Analyst
A Digital Forensics Analyst is responsible for investigating and analyzing digital evidence. This course can be a useful introduction to this role by providing a foundation in information security principles, organizational assets, and security controls.
Information Security Analyst
This course in Information Security may be useful in a role as an Information Security Analyst. An Information Security Analyst is a professional who is responsible for protecting an organization's information from unauthorized access, use, disclosure, disruption, modification, or destruction. This course touches upon the principles and general practices used by Information Security Analysts when carrying out their duties.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Introduction to Information Security.
Covers the foundational principles of information security in great detail, including confidentiality, integrity, governance, risk management, and compliance.
Provides a comprehensive overview of security controls used to protect organizational assets.
Provides a solid foundation in cryptography and network security, which are essential topics for information security professionals.
Provides a broad overview of information security with a focus on technical aspects.
Provides a non-technical introduction to information security, making it suitable for beginners.
Provides a hands-on approach to computer security with a focus on practical implementation.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser