Cyber security Fundamentals Certificate training

The Cyber security Fundamentals Course will provide fundamental principles of data and technology that frame and define cyber security. Participants will gain insight into the importance of cyber security and the integral role of cyber security professionals. The participants will explore foundational cyber security principles, security architecture, risk management, attacks, incidents, and emerging IT and IS technologies.

Training Duration: 2 days, April 7-8, 2016

Training Delivery Method: On-site


There is NO prerequisites to attend to this course

Learning Objectives:

  • Explain the core information assurance principles
  • Identify the key components of cyber security network architecture
  • Apply cyber security architecture principles
  • Identify security tools and hardening techniques
  • Distinguish system and application security threats and vulnerabilities
  • Describe different classes of attacks
  • Define types of incidents including categories, responses and timelines for response
  • Analyze threats and risks within context of the cyber security architecture
  • Appraise cyber security incidents to apply appropriate response

What Problem Does This Training Help Solve?

Provide training to understand fundamentals of Cybe rsecurity and pass ISACA’s Cyber security Fundamentals Certificate exam

Who Should Attend?

  • IT, audit, risk, compliance, information security with a familiarity of basic IT and/or IS concepts who:
    • are new to cyber security
    • are interested in entering the field of cyber security
    • are interested in the Cyber security Fundamentals Certificate provided by ISACA
  • Students and recent grads

Course Material:

Content-rich manual/course handouts printed and/or pdf

Secure access to Cybersecurity axioms for 2 months for all attendees

Course Syllabus:

Introduction to Cyber security

  • Cyber security objectives
  • Cyber security roles
  • Differences between Information Security and Cybersecurity

Cybersecurity Principles

  • Confidentiality, integrity and availability
  • Authentication and nonrepudiation

Information Security Lifecycle Management

  • Lifecycle management landscape
  • Security architecture processes
  • Security architecture tools
  • Intermediate lifecycle management concepts

Risks & Vulnerabilities

  • Basics of risk management
  • Operational threat environments
  • Classes of attacks

Incident Response

Incident Response 

  • Incident categories
  • Incident response
  • Incident recovery

Future Implications & Evolving Technologies 

  • New & emerging IT & IS technologies
  • Mobile security issues, risks, & vulnerabilities
  • Cloud concepts around data & collaboration