CSX Cybersecurity Fundamentals

The Cybersecurity Fundamentals Certificate is a knowledge-based certificate offered by ISACA. The certificate is aligned with the National Institutes of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE), which is compatible with global Cybersecurity issues, activities and job roles. The certificate is also aligned with the Skills Framework for the Information Age (SFIA).

Course Duration : 14 Hours of study (2 days), CPD / PDU: 14

Overview

This training course is for individuals preparing to take the Cybersecurity Fundamentals Certificate exam. In this course, professionals will learn the five (5) knowledge areas as determined by ISACA:

  • Cyber Security Concepts (10%)
  • Cyber Security Architecture Principles (20%)
  • Security of Networks, Systems, Applications and Data (40%)
  • Incident Response (20%)
  • Security of Evolving Technology (10%)

At the end of the course, the delegates will gain competencies in

  • Understand basic Cybersecurity concepts and definitions
  • Understand basic risk management and risk assessment principles relating to cybersecurity
  • Apply security architecture principles
  • Identify components of a security architecture
  • Define network security architecture concepts
  • Understand malware analysis concepts and methodology
  • Recognize the methodologies and techniques for detecting host- and network-based intrusions
  • Identify vulnerability assessment tools, including open source tools and their capabilities
  • Understand penetration testing principles, tools and techniques
  • Define network systems management principles, models, methods and tools
  • Understand remote access technology and systems administration concepts
  • Distinguish system and application security threats and vulnerabilities
  • Recognize system lifecycle management principles, including software security and usability
  • Outline disaster recovery and business continuity planning
  • Understand incident response and handling methodologies
  • Understand security event correlation tools
  • Recognize investigative implications of hardware, operating systems and network technologies
  • Be aware of the basic concepts, practices, tools, tactics, techniques and procedures for processing digital forensic data

Enquire