On any given day in Arizona there are hundreds of open, unfilled jobs in the field of cyber security.  These jobs have average salaries from $55,000 to $172,000 per year.  For many disadvantaged members of our Phoenix community these jobs may appear to be out of reach due to financial or other challenges.

Cyber Security Training and Consulting LLC has launched a FREE Introduction to Cyber Security boot camp training program designed to remove the financial barrier for those wishing to enter the cyber security field.

Program enrollment is limited to 25 students per course. All disadvantaged members of the Phoenix metropolitan area are welcome.  This includes, but is not limited to, Active Duty, Reserve, and Veteran military members and their spouses, law enforcement officers and their spouses, teachers and their spouses, and any other person in unfavorable circumstances, especially with regard to financial or social opportunities.

We do not require students to provide proof of their disadvantaged status.

CSI100: Introduction to Cybersecurity / CSX Fundamentals

  • Certification Level: Foundation | Cybersecurity Knowledge| Green Cyberwolf

  • Certificate Title: Cybersecurity Fundamentals Certified

  • Delivery Method: Live Classroom 

  • COMMUNITY EDITION: Two Weekend Boot Camp | 9:00 a.m. - 5:00 p.m. | Four Total Days

  • 28 Professional Development Units

  • Laptop Required

NOTE: Students may register for any of the sessions that best meet their schedule.  Modules may be re-taken up to four times.



NOTE: This course covers all subject areas (and more) to adequately prepares a student to pass the ISACA® Cybersecurity Nexus (CSX)™ Fundamentals certification exam.

Globally, the demand for cybersecurity professionals exceeds the number of available qualified personnel. “The talent shortage is very bad because of the new surge in demand coupled with the small supply of well-trained cyber professionals,” says Mark O’Reilly, Asia managing director of a recruitment agency.

​The Certified Information Systems Security Professional (CISSP) designation is an excellent path to pursue, however, it requires five years of experience in information security. We developed this course as the first step a person would take to begin a career in information security.

This course is designed to rapidly introduce students to the fundamentals of cybersecurity using the eight (8) (ISC)²® CISSP® and five (5) ISACA CSX Cybersecurity Fundamentals certification domains as a foundation including:

  • CISSP Domains

    • Security and Risk Management

    • Asset Security

    • Security Engineering

    • Communication and Network Security

    • Identity and Access Management

    • Security Assessment and Testing

    • Security Operations

    • Software Development Security

  • CSX Cybersecurity Fundamentals Domains

    • Cybersecurity Concepts

    • Cybersecurity Architecture Principles

    • Security of Networks, Systems, Applications, and Data

    • Incident Response

    • Security Implications and Adoption of Evolving Technology



Module 1 (Saturday)

  • What is cybersecurity?

  • Why is cybersecurity important?

  • What type of person are you?

    • Personality traits of cybersecurity pros

  • What role will you play in cybersecurity?

    • Typical cybersecurity functions

  • Industry certifications and typical salaries

  • Fundamentals of information technology

  • Common information security terms

  • Security and Risk Management

Module 2 (Sunday)

  • Asset Security

    • Protecting the security of assets including the implications of bring-your-own-device (BYOD); hardening of assets and data protection; and the role of change and configuration management.

  • Identity and Access Management

    • The differences between identity and access management, the role access control plays, and common access control models.

  • Communication and Network Security

    • Designing and protecting network security, network isolation and segmentation, the fundamentals of OSI and TCP, switches, firewalls, IDS vs. IPS, subnetting, IT vs. OT considerations, wireless networks and cloud security.

Module 3 (Saturday)

  • Security Engineering

    • Engineering and management of security through principles of secure design, security architecture and related threats, and cryptography.

  • Software Development Security

    • Understanding, applying and enforcing software security through a software development life cycle, the software assurance maturity model, database management systems, database threats and controls, and web application development threats and protections.

Module 4 (Sunday)

  • Security Assessment and Testing

    • Designing, performing and analyzing security through assessments and different test strategies, security controls testing, verification vs. validation, and event logging and correlations.

  • Security Operations

    • Foundational concepts, investigations, incident management, and disaster recovery including the difference between events, alerts and incidents, the anatomy of a cyber attack and a cyber incident response, CERT attack vectors and incident categories, incident response triage activities, and digital forensics.



  • CSI100 assumes a basic understanding of computers and the internet.

Why Choose Our Course?

The demand for skilled cybersecurity professionals is not going to lessen in the future. To help companies meet this demand we designed this course to give students their first introduction to the major aspects of information security. This course is ideal for anyone who wants to enter the interesting and diverse field of information security.  Not every aspect of information security requires a person to be a technology expert and this course will help students better understand which facet is best suited for them.

What You Will Receive

In this course, you will receive the following:

  • A digital rights protected electronic copy of the course material


You Will Be Able To

  • Understand and discuss the eight CISSP / five CSX Fundamentals information security domains

  • Express in detail how their employment background or personal traits align to careers within cybersecurity


Author Statement

I developed this course to help companies meet the overwhelming demand for cybersecurity professionals.  Unfortunately, there just are not enough people coming out of universities to keep up with the need so I wanted to help people jumpstart a career in information security. This course is also excellent for those that have gained various bits of information security knowledge but who really need to establish a solid foundation and help them connect the cyber security dots.  This course really lays the foundation for all other topics within information security and will help students figure out which areas of most interest to them and which ones they may be best suited for.


Cyber Security Training and Consulting LLC

112 North Central Avenue

Suite M09

Phoenix, AZ 85004

Contact Us

DUNS: 116921448

Proudly Providing Online Security Awareness Training and Instructor-led Cyber Security Training to Clients Globally

Africa | Asia | North America | South America | Central America | Eastern Europe | European Union | Middle East | Caribbean | Oceania

Our instructor-led courses are delivered at our training facilities in Mesa, Arizona. We are proud to serve the Greater Phoenix Metropolitan area including:

Apache Junction, Avondale, Buckeye, Carefree, Casa Grande, Cave Creek, Chandler, Coolidge, El Mirage, Eloy, Florence, Fountain Hills, Gila Benda, Gilbert, Glendale, Goodyear, Guadalupe, Kearny, Litchfield Park, Mammoth, Maricopa, Mesa,  Paradise Valley, Peoria, Phoenix, Queen Creek, Scottsdale, Superior, Surprise, Tempe, Tolleson, Wickenburg, Youngtown