CSI100: Introduction to Cybersecurity / CSX Fundamentals

  • Certification Level: Foundation | Cybersecurity Knowledge| Green Cyberwolf

  • Certificate Title: Cybersecurity Fundamentals Certified

  • Delivery Method: Live Classroom 

  • Duration Options (choose one):

    • BUSINESS EDITION: Three Business Days | 0900 – 1800

    • COMMUNITY EDITION: Weekend Boot Camp | 0800 - 2100

  • 24 Continuing Education / Professional Development Units

  • Laptop Required

​COMMUNITY EDITION: Disadvantaged members of the Phoenix Metropolitan area are welcome to attend our Weekend Boot Camp at no cost/free/$0.

According to the Merriam-Webster dictionary, disadvantaged means "lacking in the basic resources or conditions (such as standard housing, medical and educational facilities, and civil rights) believed to be necessary for an equal position in society."

BUSINESS EDITION: We are grateful to organizations that can pay, do pay.  Not only does it serve our local community but it also fosters resilience to cyber threats across our nation.

 

Overview

 

NOTE: This course covers all subject areas (and more) to adequately prepares a student to pass the ISACA® Cybersecurity Nexus (CSX)™ Fundamentals certification exam.

Globally, the demand for cybersecurity professionals exceeds the number of available qualified personnel. “The talent shortage is very bad because of the new surge in demand coupled with the small supply of well-trained cyber professionals,” says Mark O’Reilly, Asia managing director of a recruitment agency.

​The Certified Information Systems Security Professional (CISSP) designation is an excellent path to pursue, however, it requires five years of experience in information security. We developed this course as the first step a person would take to begin a career in information security.

This course is designed to rapidly introduce students to the fundamentals of cybersecurity using the eight (8) (ISC)²® CISSP® and five (5) ISACA CSX Cybersecurity Fundamentals certification domains as a foundation including:

  • CISSP Domains

    • Security and Risk Management

    • Asset Security

    • Security Engineering

    • Communication and Network Security

    • Identity and Access Management

    • Security Assessment and Testing

    • Security Operations

    • Software Development Security

  • CSX Cybersecurity Fundamentals Domains

    • Cybersecurity Concepts

    • Cybersecurity Architecture Principles

    • Security of Networks, Systems, Applications, and Data

    • Incident Response

    • Security Implications and Adoption of Evolving Technology

 

Agenda

Day 1

  • What is cybersecurity?

  • Why is cybersecurity important?

  • What type of person are you?

    • Personality traits of cybersecurity pros

  • What role will you play in cybersecurity?

    • Typical cybersecurity functions

  • Industry certifications and typical salaries

  • Fundamentals of information technology

  • Common information security terms

  • Security and Risk Management

 

Day 2

  • Asset Security

    • Protecting the security of assets including the implications of bring-your-own-device (BYOD); hardening of assets and data protection; and the role of change and configuration management.

  • Identity and Access Management

    • The differences between identity and access management, the role access control plays, and common access control models.

  • Communication and Network Security

    • Designing and protecting network security, network isolation and segmentation, the fundamentals of OSI and TCP, switches, firewalls, IDS vs. IPS, subnetting, IT vs. OT considerations, wireless networks and cloud security.

  • Security Engineering

    • Engineering and management of security through principles of secure design, security architecture and related threats, and cryptography.

 

Day 3

  • Software Development Security

    • Understanding, applying and enforcing software security through a software development life cycle, the software assurance maturity model, database management systems, database threats and controls, and web application development threats and protections.

  • Security Assessment and Testing

    • Designing, performing and analyzing security through assessments and different test strategies, security controls testing, verification vs. validation, and event logging and correlations.

  • Security Operations

    • Foundational concepts, investigations, incident management, and disaster recovery including the difference between events, alerts and incidents, the anatomy of a cyber attack and a cyber incident response, CERT attack vectors and incident categories, incident response triage activities, and digital forensics.

  • END OF COURSE EXAM

​Prerequisites

  • CSI100 assumes a basic understanding of computers and the internet.

Why Choose Our Course?

The demand for skilled cybersecurity professionals is not going to lessen in the future. To help companies meet this demand we designed this course to give students their first introduction to the major aspects of information security. This course is ideal for anyone who wants to enter the interesting and diverse field of information security.  Not every aspect of information security requires a person to be a technology expert and this course will help students better understand which facet is best suited for them.

What You Will Receive

In this course, you will receive the following:

  • A digital rights protected electronic copy of the course material

  

You Will Be Able To

  • Understand and discuss the eight CISSP / five CSX Fundamentals information security domains

  • Express in detail how their employment background or personal traits align to careers within cybersecurity

 

Author Statement

I developed this course to help companies meet the overwhelming demand for cybersecurity professionals.  Unfortunately, there just are not enough people coming out of universities to keep up with the need so I wanted to help people jumpstart a career in information security. This course is also excellent for those that have gained various bits of information security knowledge but who really need to establish a solid foundation and help them connect the cyber security dots.  This course really lays the foundation for all other topics within information security and will help students figure out which areas of most interest to them and which ones they may be best suited for.

USA:

Cyber Security Training and Consulting LLC

112 North Central Avenue

Suite M03

Phoenix, AZ 85004 

Info@CyberSecurityTrainingCo.com

Contact Us

CAGE CODE: 8E2S7
DUNS: 116921448

Proudly Providing Online Security Awareness Training and Instructor-led Cyber Security Training to Clients Globally

Africa | Asia | North America | South America | Central America | Eastern Europe | European Union | Middle East | Caribbean | Oceania

Our instructor-led courses are delivered at our training facilities in Mesa, Arizona. We are proud to serve the Greater Phoenix Metropolitan area including:

Apache Junction, Avondale, Buckeye, Carefree, Casa Grande, Cave Creek, Chandler, Coolidge, El Mirage, Eloy, Florence, Fountain Hills, Gila Benda, Gilbert, Glendale, Goodyear, Guadalupe, Kearny, Litchfield Park, Mammoth, Maricopa, Mesa,  Paradise Valley, Peoria, Phoenix, Queen Creek, Scottsdale, Superior, Surprise, Tempe, Tolleson, Wickenburg, Youngtown

© Cyber Security Training and Consulting LLC | Privacy Policy