Cyber Security Fundamentals Training Course
This next-gen Cyber Security Fundamentals training course provides an accelerated, high-level understanding of cyber security topics and the benefits of best practices for individuals leading or involved in the cyber security sector (and those who want to be).
Cyber Security Fundamentals
From network security to social engineering and incident response, this training course introduces you to all the key considerations that go into safeguarding your organization against threats. With next-gen virtual training, expert instructors, and white-glove service, you’ll grasp the modern InfoSec landscape in no time.
Key Features of Security Training Value-Added Workshop
No public courses are currently scheduled, but we can deliver this course onsite at your location. Contact us for a quote.
Our Cyber Security Instructors
Mark Hillyard (CISSP, ITIL Expert, ITIL MP) has worked in the IT industry for more than 20 years, including as a Public Key Infrastructure (PKI) and Domain Name System (DNS) Architect for GoDaddy.com. His experience ranges from some of the largest system infrastructures supporting the internet to boutique, game-changing start-ups. He has led large-scale data center asset management initiatives and has developed and managed such systems for enterprise infrastructures. Now a full-time Senior Advisor and resident InfoSec guru, Mark is helping transform IT organizations through process management, security development, and training.
Marguerite Finnigan, PhD
Marguerite is a cyber security consulting and training specialist with a passion for increasing awareness and technical understanding of global security threats and solutions. She has worked in the IT field since the mid-1980s and has worked around the world for the last 10 years training executives and operatives in major corporate organizations, financial institutions, and military organizations. She has addressed audiences at national conferences on behalf of (ISC)², where she has been a lead cyber security instructor for 10 years. She currently holds a “Secret” level security clearance with the US government.
"One important factor that makes Beyond20 a great organization is that the instructors work as consultants to organizations both in the private and public sector. The instructors have an excellent command of the material and have real-world experience with designing and implementing these principles. With their background, they can adapt discussion to a particular client and help students understand concepts based on how they fit into their organizations.”
Lucinda F., Manager, IT Field Operations
“It was huge for Board of Pensions (BOP) to start speaking the same language, have a common understanding, be equipped to drive culture change, and change everyone’s thinking. Now, the team is creating something together."
Nick , Assistant Director, Service Desk
"The instructor knew his stuff! The materials were well designed and the course was well paced and very appropriate for our group."
Allan C., Project Engagement Manager
Ready to Discuss Your Training Needs?
FREQUENTLY ASKED QUESTIONS
Our Cybersecurity Fundamentals course is designed for anyone who wants to learn cybersecurity concepts, terminology, and best practices.
This is a 2-day cybersecurity bootcamp.
No prerequisites are required for this high-level cybersecurity class.
The course includes a workbook with case studies and exercises that will help you become more comfortable with cybersecurity concepts.
- Humans and Security
- Types of Threats
- What is Hacking
- Networking review
- Discovery, foot-printing, and scanning
- Common vulnerabilities and exposures
- Security policies
- Limiting Access
- Remote Admin Access
- Physical Access
- Simple Network Management Protocol
- Network Devices
- Establishing secure access
- Traffic Filtering Best Practices
- What is Hardening?
- Types of Systems That Can Be Hardened
- Security Baselines
- How to Harden Systems
- Hardening Systems by Role
- Mobile Devices
- Hardening on the Network
- Analysis Tools
- Authentication, Authorization, and Accounting
- Physical Security
- Security Architecture
- Network Devices
- Network Zones
- Network Segmentation
- Network Address Translation
- Network Access Control
- What is identity management?
- Personally identifiable information
- Authentication factors
- Directory services
- Windows NT LAN Manager
- Password policies
- Cracking passwords
- Password assessment tools
- Password managers
- Group accounts
- Service accounts
- Federated identities
- Identity as a Service
- Module review
- What is Malware?
- How Do Things Get Infected?
- Types of Malware
- Types of Physical Security and Controls
- What is Social Engineering?
- Social Engineering Targets and Attacks
How We Teach
People learn differently, so we use a variety of methods to teach concepts throughout the course. In addition to exam preparation and practice quizzes, you'll engage in round-table discussions, group exercises, and games designed to give practical context to the concepts. We take this approach not only because it's more interesting and fun than simply memorizing vocabulary, but because it works.
All of our instructors are experienced practitioners with real world cybersecurity expertise. (Real experience, too. Like, former-CIO-level experience.)
We're a US-based organization with offices in DC, Phoenix, and San Diego.
Industry-Leading Course Materials
All of our courseware is reviewed multiple times a year to ensure it's up to date, in line with best practice standards, and effective! We incorporate feedback from students to constantly improve our course books, in-class activities, and (sorry) homework. The goal is to provide you with the tools to not only get you through class and pass the exam, but also to have a reliable reference when you get back to the office.
We don't just teach to the exam (though we certainly do that), we also give you practical and personalized tools you can take back to work.
We're a Registered Education Provider with PMI, so if you're PMP Certified, the course will earn you PDUs!
People Also Bought
CompTIA Security+ Certification Training
This 5-day course incorporates exercises and short-form lectures to prepare you for Security+ certification (DoD 8140/8570 compliant).
CISSP Training Boot Camp
This 5-day course for Cybersecurity leadership aligns to the CISSP domains on the certification exam - guaranteed (DoD 8140/8570 compliant).
ITIL® 4 Foundation Training Course
This 2-day introductory course will teach you ITIL 4 basics and prepare you to pass the certification exam - guaranteed.