Updates & Upcoming Course Details

Professional Series: CSI100 Introduction to Cybersecurity / CSX Fundamentals

CSI100: Introduction to Cybersecurity / CSX Cybersecurity Fundamentals

  • Certification Level: Foundation | Cybersecurity Knowledge| Green Cyberwolf

  • Certificate Title: Certificate of Cybersecurity Fundamentals

  • Delivery Method: Live Classroom

  • Duration: Three Days | 0900 – 1800

  • 24 CPEs/CEUs

  • Laptop Required


NOTE: This course covers all subject areas (and more) to adequately prepares a student to pass the ISACA Cybersecurity Nexus | CSX Cybersecurity Fundamentals certification exam.

Here in Hong Kong, as well as globally, the demand for cybersecurity professionals exceeds the number of available qualified personnel. “The talent shortage is very bad because of the new surge in demand coupled with the small supply of well-trained cyber professionals,” says Mark O’Reilly, Asia managing director of a recruitment agency.

In Hong Kong, the Cyber Security Risk Circular, an edict issued by the Hong Kong Monetary Authority in September 2015, is now fueling an unprecedented demand for cyber security staff at banks. The result? Pay rises of up to 30% are now on offer. Due to the immense local, regional and global demand it is an excellent time to transition into a more interesting and lucrative career field.

The Certified Information Systems Security Professional (CISSP) designation is an excellent path to pursue, however, it requires five years of experience in information security. We developed this course as the first step a person would take to begin a career in information security.

This course is designed to rapidly introduce students to the fundamentals of cybersecurity using the eight (8) CISSP and five (5) ISACA CSX Cybersecurity Fundamentals domains as a foundation including:

  • CISSP Domains

  • Security and Risk Management

  • Asset Security

  • Security Engineering

  • Communication and Network Security

  • Identity and Access Management

  • Security Assessment and Testing

  • Security Operations

  • Software Development Security

  • CSX Cybersecurity Fundamentals Domains

  • Cybersecurity Concepts

  • Cybersecurity Architecture Principles

  • Security of Networks, Systems, Applications, and Data

  • Incident Response

  • Security Implications and Adoption of Evolving Technology


Day 1

  • What is cybersecurity?

  • Why is cybersecurity important?

  • What type of person are you?

  • Personality traits of cybersecurity pros

  • What role will you play in cybersecurity?

  • Typical cybersecurity functions

  • Industry certifications and typical salaries

  • Fundamentals of information technology

  • Common information security terms

  • Security and Risk Management

Day 2

  • Asset Security o Protecting the security of assets including the implications of bring-your-own-device (BYOD); hardening of assets and data protection; and the role of change and configuration management.

  • Identity and Access Management o The differences between identity and access management, the role access control plays, and common access control models.

  • Communication and Network Security o Designing and protecting network security, network isolation and segmentation, the fundamentals of OSI and TCP, switches, firewalls, IDS vs. IPS, subnetting, IT vs. OT considerations, wireless networks and cloud security.

  • Security Engineering o Engineering and management of security through principles of secure design, security architecture and related threats, and cryptography.

Day 3

  • Software Development Security o Understanding, applying and enforcing software security through a software development life cycle, the software assurance maturity model, database management systems, database threats and controls, and web application development threats and protections.

  • Security Assessment and Testing o Designing, performing and analyzing security through assessments and different test strategies, security controls testing, verification vs. validation, and event logging and correlations.

  • Security Operations o Foundational concepts, investigations, incident management, and disaster recovery including the difference between events, alerts and incidents, the anatomy of a cyber attack and a cyber incident response, CERT attack vectors and incident categories, incident response triage activities, and digital forensics.



  • Lab 1 – During this lab the students will be tested on their knowledge of Security and Risk Management

  • Lab 2 – During this lab the students will be tested on their knowledge of Asset Security

  • Lab 3 – During this lab the students will be tested on their knowledge of Identity and Access Management

  • Lab 4 – During this lab the students will be tested on their knowledge of Communication and Network Security

  • Lab 5 – During this lab the students will be tested on their knowledge of Security Engineering

  • Lab 6 – During this lab the students will be tested on their knowledge of Software Development Security

  • Lab 7 – During this lab the students will be tested on their knowledge of Security Assessment and Testing

  • Lab 8 – During this lab the students will be tested on their knowledge of Security Operations


  • CSI100 assumes a basic understanding of computers and the internet.

Why Choose Our Course?

The demand for skilled cybersecurity professionals is not going to lessen in the future. To help companies meet this demand we designed this course to give students their first introduction to the major aspects of information security. This course is ideal for anyone who wants to enter the interesting and diverse field of information security. Not every aspect of information security requires a person to be a technology expert and this course will help students better understand which facet is best suited for them.

What You Will Receive

In this course, you will receive the following:

  • An electronic copy of the course training material

You Will Be Able To

  • Understand and discuss the eight CISSP/five CSX Fundamentals information security domains

  • Express in detail how their employment background or personal traits align to careers within cybersecurity

Author Statement

I developed this course to help companies meet the overwhelming demand for cybersecurity professionals. Unfortunately, there just are not enough people coming out of universities to keep up with the need so I wanted to help people jumpstart a career in information security. This course is also excellent for those that have gained various bits of information security knowledge but who really need to establish a solid foundation and help them connect the cyber security dots. This course really lays the foundation for all other topics within information security and will help students figure out which areas of most interest to them and which ones they may be best suited for.

Recent Updates


Cyber Security Training and Consulting LLC

112 North Central Avenue

Suite M09

Phoenix, AZ 85004 


Contact Us

DUNS: 116921448


Proudly Providing Online Security Awareness Training and Instructor-led Cyber Security Training to Clients Globally

Africa | Asia | North America | South America | Central America | Eastern Europe | European Union | Middle East | Caribbean | Oceania

Our instructor-led courses are delivered at our training facilities in Mesa, Arizona. We are proud to serve the Greater Phoenix Metropolitan area including:

Apache Junction, Avondale, Buckeye, Carefree, Casa Grande, Cave Creek, Chandler, Coolidge, El Mirage, Eloy, Florence, Fountain Hills, Gila Benda, Gilbert, Glendale, Goodyear, Guadalupe, Kearny, Litchfield Park, Mammoth, Maricopa, Mesa,  Paradise Valley, Peoria, Phoenix, Queen Creek, Scottsdale, Superior, Surprise, Tempe, Tolleson, Wickenburg, Youngtown

© Cyber Security Training and Consulting LLC | Privacy Policy | Payment, Cancellation, and Refund Policy | Student Complaint & Grievance Policy