The Cybersecurity Fundamentals Certificate is a knowledge-based certificate offered by ISACA. The newest element in ISACA’s Cybersecurity Nexus (CSX) program, the certificate is particularly relevant for recent college/university graduates and those looking for a career change to cybersecurity.


Course Description:

Why become a cybersecurity professional? The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamental Course is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals.

This course will also cover four key areas of cybersecurity:

  • cybersecurity architecture principles,
  • security of networks, systems, applications and data,
  • incident response, and
  • the security implications of the adoption of emerging technologies. Designed as a foundational course, it will also prepare learners for the CSX Cybersecurity Fundamentals Exam.

  • When

  • Monday, February 26, 2018 - Tuesday, February 27, 2018
    8:00 AM - 5:00 PM

  • Where

  • One North Wacker, Michigan II
    1 N. Wacker Drive
    Chicago, Illinois 60606

Additional Information

This course is not designed to cover all knowledge areas that will be tested during the Cybersecurity Fundamentals Certificate Exam. Therefore, it is recommended that you understand the following concepts prior to taking the exam. Being familiar with these items will also provide you with greater understanding of the materials presented during the workshop:

  • Security architecture principles and frameworks (i.e. SABSA, Zachman, TOGAF, etc.)
  • OSI model
  • TCP/IP
  • General firewall features, types, issues, and platforms
  • Networking (i.e. ports, protocols, VPNs, etc.)
  • Application security
  • Risk assessments
  • Business continuity plans (BCP)
  • BYOD
  • Cloud computing
  • Mobile technology risks

Outlook Outlook
iCal iCal
Google Google
Yahoo! Yahoo!