Cybersecurity Fundamentals Course

Learn Cybersecurity Basics

Course Overview

This Cybersecurity Fundamentals course provides an accelerated, high-level understanding of cybersecurity topics and the benefits of best practices for individuals leading or involved in the cybersecurity sector (and those who want to be).


Live Instructor


Our most interactive learning format gets you face-to-face with our experienced consultant-trainers.

From $895


Group Training


Bring our world-class instructors to your location and get everyone certified.



Early Registration: 9+ Weeks Prior to Start Date
General Registration: 2 - 9 Weeks Prior to Start Date
Late Registration: Fewer than 2 Weeks Prior to Start Date

  • Live Instructor?
  • Live Online?
  • Guaranteed to Run?

Why Beyond20

How We Teach

People learn differently, so we use a variety of methods to teach concepts throughout the course. In addition to exam preparation and practice quizzes, you'll engage in round-table discussions, group exercises, and games designed to give practical context to the concepts. We take this approach not only because it's more interesting and fun than simply memorizing vocabulary, but because it works.

All of our trainers are full-time Beyond20 staff

No temporary workers or subcontractors here. Our trainers are working consultants who implement best practice processes and tools when they're not in the classroom. You might say we practice what we preach. It's a great system, when you think about it - we're better consultants because we know these concepts inside and out, and we're better trainers because we get to put the theory into practice in the real world.

We don't just teach to the exam (though we certainly do that), we also give you practical and personalized tools you can take back to work.

We're a Registered Education Provider with PMI, so if you're PMP Certified, the course will earn you PDUs!

Industry-Leading Course Materials

All of our courseware is reviewed multiple times a year to ensure it's up to date, in line with best practice standards, and effective! We incorporate feedback from students to constantly improve our course books, in-class activities, and (sorry) homework. The goal is to provide you with the tools to not only get you through class and pass the exam, but also to have a reliable reference when you get back to the office.

All of our instructors are experienced practitioners with real world ITIL implementation expertise. (Real experience, too. Like, former-CIO-level experience.)

We're a US-based organization with offices in DC, Phoenix, and San Diego.


  • Networking review
  • Discovery, foot-printing, and scanning
  • Common vulnerabilities and exposures
  • Security policies
  • Vulnerabilities
  • Limiting Access
    • Remote Admin Access
    • Physical Access
  • Simple Network Management Protocol
    • Network Devices
  • Establishing secure access
  • Traffic Filtering Best Practices
  • What is Hardening?
  • Types of Systems That Can Be Hardened
  • Security Baselines
  • How to Harden Systems
    • Hardening Systems by Role
  • Mobile Devices
  • Hardening on the Network
  • Analysis Tools
    • Authentication, Authorization, and Accounting
  • Physical Security
  • Security Architecture
  • Network Devices
  • Network Zones
  • Network Segmentation
  • Network Address Translation
  • Network Access Control
  • What is identity management?
  • Personally identifiable information
  • Authentication factors
  • Directory services
  • Kerberos
  • Windows NT LAN Manager
  • Password policies
  • Cracking passwords
  • Password assessment tools
  • Password managers
  • Group accounts
  • Service accounts
  • Federated identities
  • Identity as a Service
  • Module review
  • What is Malware?
  • How Do Things Get Infected?
  • Types of Malware


Anyone who wants to get a familiarity with cyber security concepts, terminology, and best practices.

This is a 2-day course.

The course includes a workbook with a case studies and exercises.

Ready to Discuss Your Training Needs?

Related Resources