CompTIA IT Fundamentals: CIA Triad

CompTIA IT Fundamentals +    |    Beginner
  • 17 videos | 1h 43m 57s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of the cia triad framework and its importance in computer security
    Outline the principle of least privilege and its importance in computer security
    Recognize common confidentiality concerns and how they might be mitigated
    Identify common integrity concerns and how they might be mitigated
    Identify common availability concerns and how they might be mitigated
    Outline the purpose of antivirus and antimalware software, including the distinctions between antivirus and antimalware software
    Provide an overview of firewalls, including the history of firewalls and firewall types
    Recognize important considerations for password security
  • Recognize important practices for performing safe web browsing
    Identify the importance of patching and updating software and operating systems
    Outline device security best practices
    Provide an overview of best practices for enforcing software security
    Outline best practices for validating download sources
    Identify methods and best practices for mobile device security
    Identify ways to remove unwanted software, including software that's either unnecessary or malicious
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 15s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 27s
    Upon completion of this video, you will be able to provide an overview of the CIA triad framework and its importance in computer security. FREE ACCESS
  • Locked
    3.  The Principle of Least Privilege
    5m 37s
    After completing this video, you will be able to outline the principle of least privilege and its importance in computer security. FREE ACCESS
  • Locked
    4.  Confidentiality Concerns
    6m 27s
    Upon completion of this video, you will be able to recognize common confidentiality concerns and how they might be mitigated. FREE ACCESS
  • Locked
    5.  Integrity Concerns
    4m 40s
    After completing this video, you will be able to identify common integrity concerns and how they might be mitigated. FREE ACCESS
  • Locked
    6.  Availability Concerns
    5m 4s
    Upon completion of this video, you will be able to identify common availability concerns and how they might be mitigated. FREE ACCESS
  • Locked
    7.  Antivirus/Antimalware Software
    10m 56s
    After completing this video, you will be able to outline the purpose of antivirus and antimalware software, including the distinctions between antivirus and antimalware software. FREE ACCESS
  • Locked
    8.  Firewalls
    4m 55s
    Upon completion of this video, you will be able to provide an overview of firewalls, including the history of firewalls and firewall types. FREE ACCESS
  • Locked
    9.  Password Security
    7m
    Upon completion of this video, you will be able to recognize important considerations for password security. FREE ACCESS
  • Locked
    10.  Safe Web Browsing
    7m 54s
    After completing this video, you will be able to recognize important practices for performing safe web browsing. FREE ACCESS
  • Locked
    11.  Patches and Updates
    6m 55s
    Upon completion of this video, you will be able to identify the importance of patching and updating software and operating systems. FREE ACCESS
  • Locked
    12.  Device Security Best Practices
    8m 33s
    After completing this video, you will be able to outline device security best practices. FREE ACCESS
  • Locked
    13.  Software Security
    4m 58s
    Upon completion of this video, you will be able to provide an overview of best practices for enforcing software security. FREE ACCESS
  • Locked
    14.  Validating Download Sources
    6m 52s
    Upon completion of this video, you will be able to outline best practices for validating download sources. FREE ACCESS
  • Locked
    15.  Mobile Device Security
    7m 41s
    After completing this video, you will be able to identify methods and best practices for mobile device security. FREE ACCESS
  • Locked
    16.  Removing Unwanted Software
    6m 48s
    Upon completion of this video, you will be able to identify ways to remove unwanted software, including software that's either unnecessary or malicious. FREE ACCESS
  • Locked
    17.  Course Summary
    58s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 4.8 of 66 users Rating 4.8 of 66 users (66)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.9 of 22 users Rating 4.9 of 22 users (22)
Rating 4.7 of 114 users Rating 4.7 of 114 users (114)
Rating 4.3 of 69 users Rating 4.3 of 69 users (69)