CompTIA IT Fundamentals: CIA Triad
CompTIA IT Fundamentals +
| Beginner
- 17 videos | 1h 43m 57s
- Includes Assessment
- Earns a Badge
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of the cia triad framework and its importance in computer securityOutline the principle of least privilege and its importance in computer securityRecognize common confidentiality concerns and how they might be mitigatedIdentify common integrity concerns and how they might be mitigatedIdentify common availability concerns and how they might be mitigatedOutline the purpose of antivirus and antimalware software, including the distinctions between antivirus and antimalware softwareProvide an overview of firewalls, including the history of firewalls and firewall typesRecognize important considerations for password security
-
Recognize important practices for performing safe web browsingIdentify the importance of patching and updating software and operating systemsOutline device security best practicesProvide an overview of best practices for enforcing software securityOutline best practices for validating download sourcesIdentify methods and best practices for mobile device securityIdentify ways to remove unwanted software, including software that's either unnecessary or maliciousSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 15sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 27sUpon completion of this video, you will be able to provide an overview of the CIA triad framework and its importance in computer security. FREE ACCESS
-
5m 37sAfter completing this video, you will be able to outline the principle of least privilege and its importance in computer security. FREE ACCESS
-
6m 27sUpon completion of this video, you will be able to recognize common confidentiality concerns and how they might be mitigated. FREE ACCESS
-
4m 40sAfter completing this video, you will be able to identify common integrity concerns and how they might be mitigated. FREE ACCESS
-
5m 4sUpon completion of this video, you will be able to identify common availability concerns and how they might be mitigated. FREE ACCESS
-
10m 56sAfter completing this video, you will be able to outline the purpose of antivirus and antimalware software, including the distinctions between antivirus and antimalware software. FREE ACCESS
-
4m 55sUpon completion of this video, you will be able to provide an overview of firewalls, including the history of firewalls and firewall types. FREE ACCESS
-
7mUpon completion of this video, you will be able to recognize important considerations for password security. FREE ACCESS
-
7m 54sAfter completing this video, you will be able to recognize important practices for performing safe web browsing. FREE ACCESS
-
6m 55sUpon completion of this video, you will be able to identify the importance of patching and updating software and operating systems. FREE ACCESS
-
8m 33sAfter completing this video, you will be able to outline device security best practices. FREE ACCESS
-
4m 58sUpon completion of this video, you will be able to provide an overview of best practices for enforcing software security. FREE ACCESS
-
6m 52sUpon completion of this video, you will be able to outline best practices for validating download sources. FREE ACCESS
-
7m 41sAfter completing this video, you will be able to identify methods and best practices for mobile device security. FREE ACCESS
-
6m 48sUpon completion of this video, you will be able to identify ways to remove unwanted software, including software that's either unnecessary or malicious. FREE ACCESS
-
58sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.