Information Security: Getting Familiar with Essential Terminologies
Get up to speed with the main terminologies used in the
industry before learning anything about cybersecurity.
| Responsible | Micaela De Freitas |
|---|---|
| Last Update | 03/23/2026 |
| Completion Time | 1 hour 23 minutes |
| Members | 2 |
Basic
English
-
Getting Started (empty)5Lessons · 9 min
-
Introduction
-
What is Information?
-
What is Information Security?
-
What is IT Security?
-
What is Cybersecurity?
-
-
Protection Goals (empty)8Lessons · 21 min
-
Confidentiality Explained
-
Integrity Explained
-
Availability Explained
-
Authenticity Explained
-
Non-Contestability Explained
-
Non-Repudiation Explained
-
Traceability Explained
-
Accountability Explained
-
-
Offensive Security (empty)4Lessons · 7 min
-
What is a Threat?
-
What is an Attack Vector?
-
What is a Threat Landscape?
-
What are Advanced Persistent Threats?
-
-
Defensive Security (empty)7Lessons · 19 min
-
Vulnerability Explained
-
Attack Surface Explained
-
Cyber Threat Intelligence Explained
-
Identity and Access Management Explained
-
Physical Security Explained
-
Information Security Management System Explained
-
Security Operations Center Explained
-
-
Governance, Risk & Compliance (empty)6Lessons · 14 min
-
What is IT Governance?
-
What is a Resource?
-
What is a Risk?
-
What is Risk Exposure?
-
What is Risk Treatment?
-
What is Compliance?
-
-
Training & Education (empty)1Lessons · 3 min
-
Awareness Explained
-
-
Quiz (empty)2Lessons · 10 min
-
Course Quiz10 xp
-
Certificate of Completion
-