Cybersecurity Fundamentals Training Course

Learn Cybersecurity Basics

Course Overview

This Cybersecurity Fundamentals course provides an accelerated, high-level understanding of cybersecurity topics and the benefits of best practices for individuals leading or involved in the cybersecurity sector (and those who want to be).

PERSONAL

Live Instructor

 

Our most interactive learning format gets you face-to-face with our experienced consultant-trainers.

From $895

BUSINESS

Group Training

 

Bring our world-class instructors to your location and get everyone certified.

 

UPCOMING COURSES

No public courses are currently scheduled, but we can deliver this course onsite at your location. Contact us for a quote.

Ready to Discuss Your Training Needs?

FREQUENTLY ASKED QUESTIONS

Anyone who wants to get a familiarity with cyber security concepts, terminology, and best practices.

This is a 2-day course.

The course includes a workbook with a case studies and exercises.

COURSE SYLLABUS

  • Networking review
  • Discovery, foot-printing, and scanning
  • Common vulnerabilities and exposures
  • Security policies
  • Vulnerabilities
  • Limiting Access
    • Remote Admin Access
    • Physical Access
  • Simple Network Management Protocol
    • Network Devices
  • Establishing secure access
  • Traffic Filtering Best Practices
  • What is Hardening?
  • Types of Systems That Can Be Hardened
  • Security Baselines
  • How to Harden Systems
    • Hardening Systems by Role
  • Mobile Devices
  • Hardening on the Network
  • Analysis Tools
    • Authentication, Authorization, and Accounting
  • Physical Security
  • Security Architecture
  • Network Devices
  • Network Zones
  • Network Segmentation
  • Network Address Translation
  • Network Access Control
  • What is identity management?
  • Personally identifiable information
  • Authentication factors
  • Directory services
  • Kerberos
  • Windows NT LAN Manager
  • Password policies
  • Cracking passwords
  • Password assessment tools
  • Password managers
  • Group accounts
  • Service accounts
  • Federated identities
  • Identity as a Service
  • Module review
  • What is Malware?
  • How Do Things Get Infected?
  • Types of Malware

Why Beyond20

How We Teach

People learn differently, so we use a variety of methods to teach concepts throughout the course. In addition to exam preparation and practice quizzes, you'll engage in round-table discussions, group exercises, and games designed to give practical context to the concepts. We take this approach not only because it's more interesting and fun than simply memorizing vocabulary, but because it works.

All of our instructors are experienced practitioners with real world cybersecurity expertise. (Real experience, too. Like, former-CIO-level experience.)

We're a US-based organization with offices in DC, Phoenix, and San Diego.

Industry-Leading Course Materials

All of our courseware is reviewed multiple times a year to ensure it's up to date, in line with best practice standards, and effective! We incorporate feedback from students to constantly improve our course books, in-class activities, and (sorry) homework. The goal is to provide you with the tools to not only get you through class and pass the exam, but also to have a reliable reference when you get back to the office.

We don't just teach to the exam (though we certainly do that), we also give you practical and personalized tools you can take back to work.

We're a Registered Education Provider with PMI, so if you're PMP Certified, the course will earn you PDUs!

Related Resources