Security Principles

0
Level

Advanced

Language

Last updated on April 22, 2026 2:22 pm

Learn the foundational concepts of cybersecurity principles, risk management, security controls, and governance in this specialized course. No prerequisites required. Ideal for IT professionals, career changers, college students, and high school graduates looking to start their path towards cybersecurity leadership. Gain knowledge and skills to excel in the Certified in Cybersecurity entry-level exam.

Add your review

Welcome to course 1 of 5 of this Specialization, Security Principles.

After completing this course, the participant will be able to: 
Discuss the foundational concepts of cybersecurity principles.
– Recognize foundational security concepts of information assurance.
– Define risk management terminology and summarize the process.
– Relate risk management to personal or professional practices.
– Classify types of security controls.
– Distinguish between policies, procedures, standards, regulations and laws.
– Demonstrate the relationship among governance elements.
– Analyze appropriate outcomes according to the canons of the (ISC)2 Code of Ethics when given examples.
– Practice the terminology and review security principles.
Agenda
Course Introduction
Module 1: Information Assurance
Module 2: Risk Management Process
Module 3: Security Controls
Module 4: Governance
Module 5: (ISC)2 Code of Ethics
Module 6: Course Summary
This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam.
There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.

What you will learn

Course Introduction

After completing this chapter, the participant will be able to:  Discuss the foundational concepts of cybersecurity principles. Recognize foundational security concepts of information assurance. Define risk management terminology and summarize the process. Relate risk management to personal or professional practices. Classify types of security controls. Distinguish between policies, procedures, standards, regulations and laws. Demonstrate the relationship among governance elements. Analyze appropriate outcomes according to the canons of the (ISC)2 Code of Ethics when given examples. Practice the terminology and review security principles.

Information Assurance

Throughout this module, we will focus on Information Assurance.

Risk Mitigation Process

Throughout this module, we will focus on the Risk Mitigation Process.

Security Controls

Throughout this module, we will focus on Security Controls.

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Security Principles”

×

    Your Email (required)

    Report this page
    LiveTalent.org
    Logo
    LiveTalent.org
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.