menu logo
user search
cart 0

Cyber Security Fundamentals

  • Overview ImageOverview
  • Outline ImageCourse Outline
  • Scheduled ImageScheduled Dates

Course Overview

To help address the global cyber security skills crisis head on, ISACA has created Cybersecurity Nexus™ (CSX), a certification path for the cyber security professional. The Cybersecurity (CSX) certification path starts with the knowledge-based Cybersecurity Fundamentals (CSX) Certificate for those who are new to the profession or are considering to change careers, and centres the performance-based certification as the CSX Practitioner, CSX Specialist and CSX Expert level.

Cybersecurity Fundamentals (CSX) offers a knowledge-based Certificate in the concepts that frame and define the standards, guidelines and practices of the industry. This 4-day training provides in- depth instruction on the principles of cyber security and the integral role of cyber security professionals protecting enterprise data and infrastructure.

Why become a cyber security professional? Why take the Cybersecurity Fundamentals (CSX) exam? Because the protection of information is critical to all enterprises. Cyber security is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of IT.

The training is designed for this purpose, as well as to provide insight into the importance of cyber security and the integral role of cyber security professionals. The 4-day training on Cyber Security Fundamentals will provide you with a full overview of the key concepts of cyber security, the standards, guidelines and practices, along with the role of the cyber security professional in our world today. In addition, this practical cyber security knowledge training will prepare you for the ISACA Cybersecurity Fundamentals (CSX) exam.

*CSX is a registered trademark of ISACA.

As a participant of this training, you will receive a personal certificate.

The Cybersecurity Fundamentals (CSX) exam is an online, closed book, remotely proctored exam. The exam covers the 5 domains and includes a total of 75 multiple choice questions. The number of questions in each domain depends on the weight assigned. The exam takes 2 hours and the passing score is 65%.

This 4-day training reviews a total of 5 exam domains:

  • Domain 1 - Cyber security concepts
  • Domain 2 - Cyber security architecture principles
  • Domain 3 - Security of networks, systems, applications, and data
  • Domain 4 - Incident response
  • Domain 5 - Security implications and adoption of evolving technology


In this 4-day training you will learn to:

  • understand basic cyber security concepts and definitions
  • understand basic security architecture principles
  • understand security of networks, systems, applications and data
  • define types of incidents and identify elements of an incident response plan
  • explain the core Information Assurance (IA) principles
  • identify the key components of cyber security network architecture
  • apply cyber security architecture principles
  • describe risk management processes and practices
  • identify security tools and hardening techniques
  • distinguish system and application security threats and vulnerabilities
  • describe different classes of attacks
  • define types of incidents including categories, responses and timelines for response
  • describe new and emerging IT and Information Security (IS) technologies
  • analyze threats and risks within the context of the cyber security architecture
  • appraise cyber security incidents to apply appropriate response
  • evaluate decision making outcomes of cyber security solutions
  • access additional external responses to supplement knowledge of cyber security

In addition you will be prepared to take the ISACA Cybersecurity Fundamentals (CSX) Certificate exam.

Register Now

Course Outline


Domain 1 – Cyber security concepts

  • Cyber security principles used to manage risks related to the use, processing, storage and transmission of information or data
  • Security management
  • Risk management processes, including steps and methods for assessing risk
  • Threat actors
  • Cyber security roles
  • Common Adversary Tactics, Techniques and Procedures (TTPs)  u Relevant laws, policies, procedures and governance requirements u         Cyber security controls

Domain 2 – Cyber security architecture principles

  • Network design processes, to include understanding of security objectives, operational objectives and trade-offs
  • Security system design methods, tools and techniques
  • Network access, Identity and Access Management (IAM)
  • IT security principles and methods
  • Network security architecture concepts, including technology, protocols, components and principles
  • Malware analysis concepts and  methodology
  • Intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
  • Defense in depth principles and network security architecture
  • Encryption algorithms
  • Cryptography
  • Encryption methodologies
  • The process of traffic flows across the network (e.g., transmission and encapsulation)
  • Network protocols, dynamic host configuration protocol, and directory services


Domain 3 – Security of networks, systems, applications and data

  • Vulnerability assessment tools and their capabilities
  • Basic system administration, network and operating system hardening techniques
  • Risk associated with virtualizations
  • Penetration testing
  • Network systems management principles, modules, methods and tools
  • Remote access technology
  • Unix command line
  • System and application security threats and vulnerabilities
  • System life cycle management principles, including software security and usability
  • Local specialized system requirements for safety, performance and reliability
  • System and application security threats and vulnerabilities  u  Social dynamics of computer attackers in a global context  u Secure configuration management techniques
  • Capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media an related hardware
  • Communication methods, principles and concepts that support the network infrastructure
  • Common networking protocols and services and how they interact to provide network communications
  • Different types of network communication
  • Virutalization technologies and virtual machine development and maintenance
  • Application security
  • Risk threat assessment


Domain 4 – Incident response

  • Incident categories and response
  • Business continuity/disaster recovery
  • Incident response and handling methodologies
  • Security event correlation tools
  • Processes for seizing and preserving digital evidence
  • Types of digital forensics data
  • Basic concepts and practices of processing digital evidence
  • Anti-forensics tactics, techniques and procedures (TTPS)
  • Common forensic tool configuration and support applications
  • Network traffic analysis methods
  • Which system files contain relevant information and where to find those system files

Domain 5 – Security implications and adoption of evolving technology

  • Emerging technology and associated security issues, risks and vulnerabilities
  • Risk associated with mobile computing
  • Cloud concepts around data and collaboration
  • Risk of moving applications and infrastructure to the cloud
  • Risk associated with outsourcing
  • Supply chain risk management processes and practices

Day 4

Exam Prep

Register Now

Schedule & Fees

3 For 2Offer

Get the most out of group training with our special discount! Register 3 of your participants together on the same course and only pay for 2.

Select Month

  • All
  • October


  • All
  • Amsterdam amsterdam icon
  • Innovation and Artificial Intelligence (AI)

Duration: 20 CPD hours (4Days)

date: 09 - 12 Oct 2024

Register Now
  • Innovation and Artificial Intelligence (AI)

Cyber Security Fundamentals

Duration:4 Days (20 CPD hours)

date:09 - 12 Oct 2024




Register Now

Questions? Speak to our
friendly training advisor

Dunya Sayedyusef


Call+44 2071836657

  • Member

    100000+ Members in

  • Country

    59+ Countries with

  • Chapter

    3000+ Chapters

Register Now

Why Choose London Training For Excellence?

  • icon icon


    We will never cancel a confirmed booking

  • icon icon


    We offer around the clock support

  • icon icon


    We customise our courses to suit your personal learning needs

  • icon icon


    Our courses are delivered by highly experienced industry experts

  • icon icon


    All our courses are accredited by the CPD Standards Agency

Frequently Asked Questions

How can training courses be used as a company benefit?

Training is hugely beneficial to both yourself and your company. It enables you to employ new technologies, increases your productivity and enables you to be more autonomous. Have a look here at our infographic on the importance of training and development!

How often do you update your course content to ensure relevancy?

Our course content is constantly reviewed and updated to ensure we stay up to date with all the latest trends. After every course is completed we review the feedback and improve the material where necessary.

Do you keep your classroom environment and instructional methodologies current with today’s real-world workplace?

Yes, we focus our training on ‘real-world’ scenarios and our trainers are all highly experienced and skilled in their relevant fields.

Are your courses eligible for professional certification?

Yes, we offer certification with all our courses, every course is entitled to CPD (Continuous Professional Development) hours which you can put towards your professional portfolio.

Please provide us with some details below and we will send a copy of the course outlines direct to your inbox

Cyber Security Fundamentals

  • NetherlandsAmsterdam
  • calendar09 - 12 Oct 2024
By submitting this form you agree to our Terms and Conditions and Privacy Policy.
Cyber Security Fundamentals

Request more information

  • NetherlandsAmsterdam
  • 09 - 12 Oct 2024
By submitting this form you agree to our Terms and Conditions and Privacy Policy.

Our Clients

foundation wind energy icon petronas icon ministry of finance icon ministry of energy icon indonesia financial services authority icon federal mortgage bank of nigeria icon epexspot icon european central bank icon saudi aramco icon icrc icon undp banner public investment fund icon technology and security ecosystem icon


By submitting this form you agree to our Terms and Conditions and Privacy Policy.