Class Details

Cybersecurity Foundations Training Course Price: $2,500

Training promotions may be available, contact a training consultant at 240-667-7757 for more information!

This hands-on, instructor-led course covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Students will learn many tips through examples that reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions help students deepen their understanding and apply all they've learned.

Price Match Guarantee Phoenix TS

Cybersecurity Foundations Training Course Includes:

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Course retake option
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available throughout the day
  • Freshly baked cookies every afternoon - *only at participating locations

Course Outline

Module 1: Introduction to Information Security

Module 2: The Need for Security

Module 3: Legal, Ethical, and Professional Issues in Information Security

Module 4: Planning for Security

Module 5: Risk Management

Module 6: Security Technology: Access Controls, Firewalls, and VPNs

Module 7: Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools

Module 8: Cryptography

Module 9: Physical Security

Module 10: Implementing Information Security

Module 11: Security and Personnel

Module 12: Information Security Maintenance

Objectives

Cybersecurity Foundations Training Objectives: 

  • Understand and explain the need for security
  • Understand legal, ethical, and professional issues in Informaton Security
  • Plan for security
  • Understand Risk Management
  • Implement security technology: Access Controls, Firewalls, and VPNs
  • Implement Intrusion Detection and Prevention Systems and Other Security Tools
  • Understand cryptography
  • Implement training and Policies to ensure secure personnel
  • Implement information security maintenance