Cybersecurity Fundamentals Online Course

Online Course

Online courses can be accessed from the Learning Access tab of your MyISACA account.

Format Online

CPE's 8

Duration 8 hours | 120-day Subscription

Member Price:
$250.00
Non-Member Price:
$400.00

Gain new expertise and prepare to start or advance your role in the increasingly important and in-demand field of cybersecurity. Leverage the power of our Cybersecurity Fundamentals Online Course to enhance your understanding of the principles that frame and define cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data and infrastructure.

Gain new expertise and prepare to start or advance your role in the increasingly important and in-demand field of cybersecurity. Leverage the power of our Cybersecurity Fundamentals Online Course to enhance your understanding of the principles that frame and define cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data and infrastructure.

The Cybersecurity Fundamentals Online Course has a seat time of approximately 8 hours, which must be completed within the subscription period.

Product Code: LMS_CXF

Course Description

The Cybersecurity Fundamentals Online Course provides learners with principles of data and technology that frame and define cybersecurity. Learners gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The interactive, self-guided format provides a dynamic learning experience where users can explore foundational cybersecurity principles, security architecture, risk management, attacks, incidents and emerging IT and IS technologies.

Learning Objectives:

At the completion of this course you will be able to:

  • Explain the core information assurance (IA) principles
  • Identify the key components of cybersecurity network architecture
  • Apply cybersecurity architecture principles
  • Describe risk management processes and practices
  • Identify security tools and hardening techniques
  • Distinguish system and application security threats and vulnerabilities
  • Describe different classes of attacks
  • Define types of incidents including categories, responses and timelines for response
  • Describe new and emerging TI and IS technologies
  • Analyze threats and risks within context of the cybersecurity architecture
  • Appraise cybersecurity incidents to apply appropriate response
  • Evaluate decision making outcomes of cybersecurity scenarios
  • Access additional external resources to supplement knowledge of cybersecurity

Note: This course is not designed to cover all knowledge areas that will be tested in the Cybersecurity Fundamentals Certificate Exam. Therefore, it is recommended that you understand the following concepts prior to taking the exam:

  • Security architecture principles and frameworks (i.e. SABSA, Zachman, TOGAF, etc.)
  • OSI model
  • TCP/IP
  • General firewall features, types, issues and platforms
  • Networking (i.e. ports, protocols, VPNs, etc.)
  • Application security
  • Risk assessments
  • Business continuity plans (BCP)
  • BYOD

Ideal For:

  • Individuals with zero to three years cybersecurity experience
  • Audit, risk, compliance, information security, government and legal professionals with a familiarity of basic IT/IS concepts who:
        • are new to cybersecurity
        • are interested in entering the field of cybersecurity
        • are interested in the ISACA Cybersecurity Fundamentals Certificate
  • Students or recent graduates

Cancellation/Refund Policy

All purchases of online learning courses are final. Access to the online learning courses and materials is immediate upon purchasing; therefore no refunds or exchanges will be provided. Prices subject to change without notice.

Enterprise Training

Online review courses are also available for purchase through our enterprise sales team for larger organizations. Visit the Enterprise Training page and reach out to an associate for more information. 

Course Outline

Introduction to Cybersecurity

  • Cybersecurity objectives
  • Cybersecurity roles
  • Differences between Information Security and Cybersecurity

Cybersecurity Principles

  • Confidentiality, integrity and availability 
  • Authentication and nonrepudiation

Information Security (IS) within Lifecycle Management

  • Lifecycle management landscape
  • Security architecture processes
  • Security architecture tools
  • Intermediate lifecycle management concepts 

Risks and Vulnerabilities

  • Basics of risk management
  • Operational threat environments
  • Classes of attacks

Incident Response

  • Incident categories
  • Incident response
  • Incident recovery

Future Implications and Evolving Technologies

  • New and emerging IT and IS technologies
  • Mobile security issues, risks and vulnerabilities
  • Cloud concepts around data and collaboration