Cybersecurity Fundamentals 2 Day Course
course learning objectives
CSX | Cybersecurity Fundamentals Course (2 day)

The two-day Cybersecurity Fundamentals course offers in-person instruction on the foundational concepts and principles of cyber security. Each day of the workshop offers insight into the concepts that define and frame modern cyber security standards, guidelines and practices.

This short format, two-day course is not designed to cover all knowledge areas that will be tested during the Cybersecurity Fundamentals Exam. In order to make the most of this workshop and use it an aid to preparing for the exam, it is recommended that you understand the following concepts prior to taking this course:

  • Security architecture principles and frameworks (i.e. SABSA, Zachman, TOGAF, etc.)
  • OSI model
  • TCP/IP
  • General firewall features, types, issues, and platforms
  • Networking (i.e. ports, protocols, VPNs, etc.)
  • Application security
  • Risk assessments
  • Business continuity plans (BCP)
  • Cloud computing
  • Mobile technology risks

Becoming familiar with these subjects will provide you with greater understanding of the materials presented during the workshop.

Learning Objectives

After completing this workshop, attendees will be able to:

  • Understand basic cyber security concepts and definitions
  • Identify cyber security roles
  • Understand basic security architecture principles
  • Understand malware analysis concepts
  • Recognize the techniques for detecting host- and network-based intrusions via intrusion detection technologies
  • Understand vulnerability assessment management
  • Recognize penetration testing phases
  • Understand high level network security, including remote access technology and systems administration concepts
  • Understand system hardening and virtualization
  • Recognize system lifecycle management principles
  • Review the OWASP top ten
  • Differentiate between events and incidents
  • Define types of incidents and identify elements of an incident response plan
  • Be aware of the basic procedures for processing digital forensic data
  • Recognize new and emerging information technology, and identity the associated security implications