Cyber Security Fundamentals Training Course
This next-gen Cyber Security Fundamentals training course provides an accelerated, high-level understanding of cyber security topics and the benefits of best practices for individuals leading or involved in the cyber security sector (and those who want to be).
Cyber Security Fundamentals
From network security to social engineering and incident response, this training course introduces you to all the key considerations that go into safeguarding your organization against threats. With next-gen virtual training, expert instructors, and white-glove service, you’ll grasp the modern InfoSec landscape in no time.
Key Features of Security Training Value-Added Workshop
Value-Added Workshop
UPCOMING COURSES
No public courses are currently scheduled, but we can deliver this course onsite at your location. Contact us for a quote.
Ready to Discuss Your Training Needs?
FREQUENTLY ASKED QUESTIONS
Our Cybersecurity Fundamentals course is designed for anyone who wants to learn cybersecurity concepts, terminology, and best practices.
This is a 2-day cybersecurity bootcamp.
No prerequisites are required for this high-level cybersecurity class.
The course includes a workbook with case studies and exercises that will help you become more comfortable with cybersecurity concepts.
COURSE SYLLABUS
- Humans and Security
- Types of Threats
- What is Hacking
- Networking review
- Discovery, foot-printing, and scanning
- Common vulnerabilities and exposures
- Security policies
- Vulnerabilities
- Limiting Access
- Remote Admin Access
- Physical Access
- Simple Network Management Protocol
- Network Devices
- Establishing secure access
- Traffic Filtering Best Practices
- What is Hardening?
- Types of Systems That Can Be Hardened
- Security Baselines
- How to Harden Systems
- Hardening Systems by Role
- Mobile Devices
- Hardening on the Network
- Analysis Tools
- Authentication, Authorization, and Accounting
- Physical Security
- Security Architecture
- Network Devices
- Network Zones
- Network Segmentation
- Network Address Translation
- Network Access Control
- What is identity management?
- Personally identifiable information
- Authentication factors
- Directory services
- Kerberos
- Windows NT LAN Manager
- Password policies
- Cracking passwords
- Password assessment tools
- Password managers
- Group accounts
- Service accounts
- Federated identities
- Identity as a Service
- Module review
- What is Malware?
- How Do Things Get Infected?
- Types of Malware
- Types of Physical Security and Controls
- What is Social Engineering?
- Social Engineering Targets and Attacks
Why Beyond20
How We Teach
People learn differently, so we use a variety of methods to teach concepts throughout the course. In addition to exam preparation and practice quizzes, you'll engage in round-table discussions, group exercises, and games designed to give practical context to the concepts. We take this approach not only because it's more interesting and fun than simply memorizing vocabulary, but because it works.
All of our instructors are experienced practitioners with real world cybersecurity expertise. (Real experience, too. Like, former-CIO-level experience.)
We're a US-based organization with offices in DC, Phoenix, and San Diego.
Industry-Leading Course Materials
All of our courseware is reviewed multiple times a year to ensure it's up to date, in line with best practice standards, and effective! We incorporate feedback from students to constantly improve our course books, in-class activities, and (sorry) homework. The goal is to provide you with the tools to not only get you through class and pass the exam, but also to have a reliable reference when you get back to the office.
We don't just teach to the exam (though we certainly do that), we also give you practical and personalized tools you can take back to work.
We're a Registered Education Provider with PMI, so if you're PMP Certified, the course will earn you PDUs!
People Also Bought
CompTIA Security+ Certification Training
This 5-day course incorporates exercises and short-form lectures to prepare you for Security+ certification (DoD 8140/8570 compliant).
CISSP Training Boot Camp
This 5-day course for Cybersecurity leadership aligns to the CISSP domains on the certification exam - guaranteed (DoD 8140/8570 compliant).
ITIL® 4 Foundation Training Course
This 2-day introductory course will teach you ITIL 4 basics and prepare you to pass the certification exam - guaranteed.