Certificate Level 2-3 Foundation IT Industry Cyber Security & Information Assurance

Certificate in Information Security Fundamentals

Foundation Level

6 Subjects
24 Chapters
120 Lessons
500 Marks

LAPT — London Academy of Professional Training

Certificate in Information Security Fundamentals
Certificate Level 2-3
  • IT-CSI-F
  • Foundation Stage
  • 500 total marks
  • Pass: 300 marks (60%)
  • Validity: Lifetime
Enrol Now View Brochure
AwardCertificate
Global LevelLevel 2-3
Total Marks500
Pass Mark300 (60%)
Subjects6
Chapters24
Classes120

About This Certification

Who Is This For?

This certification is intended for individuals starting their careers in IT or those currently in roles that require a basic understanding of information security. Ideal for recent graduates, career changers, or IT professionals seeking foundational cybersecurity knowledge.

Course Curriculum

6 subjects • 24 chapters • 120 classes
01
Security Policies and Procedures
4 chapters • 20 classes • 100 marks • 15h
Understanding Security Policies: Purpose and Scope 5 classes
1.1 Defining Security Policies and Their Importance
1.2 Identifying Key Components of Security Policies
1.3 Exploring the Scope of Security Policies
1.4 Examining Types of Security Policies
1.5 Applying Security Policies to Organizational Contexts
Developing and Implementing Security Procedures 5 classes
2.1 Understanding the Role of Security Policies
2.2 Identifying Key Components of Security Procedures
2.3 Designing Effective Security Procedures
2.4 Implementing Security Procedures Across the Organization
2.5 Evaluating and Improving Security Procedures
Compliance and Regulatory Requirements 5 classes
3.1 Understanding the Importance of Compliance in Information Security
3.2 Exploring Key Regulatory Frameworks
3.3 Analyzing How to Implement Security Policies
3.4 Identifying Common Compliance Challenges
3.5 Evaluating Strategies for Maintaining Compliance
Monitoring and Reviewing Security Policies and Procedures 5 classes
4.1 Understanding the Importance of Monitoring Security Policies
4.2 Identifying Key Metrics for Security Policy Effectiveness
4.3 Implementing Tools and Techniques for Security Monitoring
4.4 Analyzing Security Policy Data for Continuous Improvement
4.5 Conducting Regular Reviews and Updates of Security Procedures
02
Data Protection Techniques
4 chapters • 20 classes • 125 marks • 15h
Understanding Data Protection Principles 5 classes
1.1 Exploring Data Protection Basics
1.2 Identifying Personal Data Types
1.3 Analyzing Data Processing Principles
1.4 Understanding Data Subject Rights
1.5 Implementing Data Security Measures
Data Encryption Techniques and Implementation 5 classes
2.1 Understanding Basic Encryption Concepts
2.2 Exploring Symmetric Encryption Methods
2.3 Delving into Asymmetric Encryption Techniques
2.4 Implementing Encryption in Real-World Scenarios
2.5 Evaluating Encryption Protocols and Best Practices
Access Control and Authentication Mechanisms 5 classes
3.1 Understanding Access Control Concepts
3.2 Exploring Authentication Mechanisms
3.3 Implementing Role-Based Access Control
3.4 Analyzing Multi-Factor Authentication Techniques
3.5 Evaluating Effective Access Control Strategies
Data Loss Prevention and Recovery Strategies 5 classes
4.1 Understanding Data Loss: Types and Causes
4.2 Exploring Data Protection Technologies
4.3 Implementing Data Loss Prevention Strategies
4.4 Mastering Data Backup and Recovery Processes
4.5 Evaluating and Enhancing Recovery Strategies
03
Legal and Regulatory Compliance
4 chapters • 20 classes • 50 marks • 10h
Understanding Legal Frameworks in Cybersecurity 5 classes
1.1 Exploring the Basics of Legal Frameworks in Cybersecurity
1.2 Identifying Key Cybersecurity Laws and Regulations
1.3 Analyzing Data Protection and Privacy Legislation
1.4 Understanding Cybersecurity Compliance Requirements
1.5 Applying Legal Concepts to Real-World Cybersecurity Scenarios
Data Protection and Privacy Laws 5 classes
2.1 Understanding the Basics of Data Protection
2.2 Exploring the Principles of GDPR
2.3 Identifying Key Privacy Rights and Obligations
2.4 Analyzing the Role of Data Protection Authorities
2.5 Applying Data Protection Laws in Practice
Compliance Standards and Best Practices 5 classes
3.1 Understand Key Compliance Standards in Information Security
3.2 Explore the Impact of Regulatory Requirements on Businesses
3.3 Identify Best Practices in Implementing Security Compliance
3.4 Analyze Case Studies of Compliance Failures and Successes
3.5 Develop Strategies for Maintaining Ongoing Compliance
Legal Implications of Security Breaches 5 classes
4.1 Understanding Legal Definitions in Data Breaches
4.2 Exploring Key Legislation Impacting Information Security
4.3 Analyzing the Consequences of Security Breaches
4.4 Identifying Responsibilities Under UK Data Protection Laws
4.5 Applying Legal Knowledge to Security Breach Scenarios
04
Risk Management
4 chapters • 20 classes • 75 marks • 10h
Understanding Risk in Information Security 5 classes
1.1 Defining Information Security Risk
1.2 Identifying Potential Threats and Vulnerabilities
1.3 Analyzing Impact and Likelihood
1.4 Assessing and Prioritizing Risks
1.5 Implementing Risk Mitigation Strategies
Risk Assessment Methodologies 5 classes
2.1 Understanding Risk in Information Security
2.2 Exploring Different Risk Assessment Methods
2.3 Identifying and Analyzing Potential Threats
2.4 Evaluating Vulnerability Impact and Likelihood
2.5 Applying Risk Assessment in Real-World Scenarios
Risk Management Strategies and Controls 5 classes
3.1 Understanding Risk Management Frameworks
3.2 Identifying and Assessing Risks
3.3 Implementing Risk Mitigation Strategies
3.4 Evaluating Risk Controls and Their Effectiveness
3.5 Adapting Risk Management to Emerging Threats
Monitoring and Reviewing Risk Management Plans 5 classes
4.1 Understanding the Importance of Monitoring Risk Management Plans
4.2 Identifying Key Metrics for Effective Risk Monitoring
4.3 Techniques for Analyzing Risk Management Effectiveness
4.4 Implementing Feedback Loops for Continuous Improvement
4.5 Evaluating and Updating Risk Management Strategies
05
Threats and Vulnerabilities
4 chapters • 20 classes • 75 marks • 15h
Understanding Cyber Threats 5 classes
1.1 Defining Cyber Threats and Their Impact
1.2 Identifying Common Types of Cyber Threats
1.3 Exploring Threat Actors and Their Motivations
1.4 Analyzing Vulnerabilities in Information Systems
1.5 Implementing Basic Threat Mitigation Strategies
Identifying System Vulnerabilities 5 classes
2.1 Understanding System Vulnerabilities
2.2 Exploring Common Vulnerability Types
2.3 Analyzing Real-World Vulnerability Examples
2.4 Identifying Vulnerabilities in Software and Hardware
2.5 Applying Tools for Vulnerability Assessment
Techniques of Exploit and Attack 5 classes
3.1 Understanding Common Exploit Techniques
3.2 Identifying System Vulnerabilities
3.3 Analyzing Social Engineering Tactics
3.4 Exploring Malware Delivery Methods
3.5 Applying Defensive Strategies Against Exploits
Assessing and Mitigating Risks 5 classes
4.1 Understanding Risk Assessment Fundamentals
4.2 Identifying Information Security Threats
4.3 Analyzing Vulnerabilities in Information Systems
4.4 Developing Risk Mitigation Strategies
4.5 Implementing and Evaluating Risk Controls
06
Introduction to Cybersecurity
4 chapters • 20 classes • 75 marks • 15h
Understanding Cybersecurity Fundamentals 5 classes
1.1 Recognizing Key Cybersecurity Concepts
1.2 Identifying Common Cyber Threats and Vulnerabilities
1.3 Exploring the Importance of Data Security
1.4 Understanding the Role of Firewalls and Antivirus
1.5 Implementing Basic Cyber Hygiene Practices
Cyber Threats and Vulnerabilities 5 classes
2.1 Identify Common Cyber Threats
2.2 Understand the Impact of Cyber Threats
2.3 Recognize Vulnerabilities in Information Systems
2.4 Explore Techniques Used by Cyber Criminals
2.5 Apply Strategies to Mitigate Cyber Risks
Cyber Defense Strategies and Technologies 5 classes
3.1 Understanding Cyber Threats and Vulnerabilities
3.2 Exploring Cyber Defense Technologies
3.3 Implementing Data Protection Measures
3.4 Analyzing Network Security Protocols
3.5 Developing an Incident Response Plan
Regulatory and Ethical Considerations in Cybersecurity 5 classes
4.1 Understanding Cybersecurity Regulations and Standards
4.2 Exploring Key Ethical Principles in Cybersecurity
4.3 Analyzing the Role of Data Protection Laws
4.4 Evaluating Case Studies on Ethical Breaches
4.5 Applying Best Practices for Legal and Ethical Compliance

Assessment & Grading

Assessment Methods
  • Written Examination
  • Practical Assignment
  • Portfolio Assessment
Theory
70%
Practical
20%
Project
10%
Certificate in Information Security Fundamentals
Certificate Level 2-3
  • IT-CSI-F
  • Foundation Stage
  • 500 total marks
  • Pass: 300 (60%)
  • Validity: Lifetime
  • IT Industry
Enrol Now View Brochure
Enrol Now

Related Certifications


Chat with us Chat with us