Fundamentals of Cybersecurity

Instructor-led training course

At a glance

The Fundamentals of Cybersecurity course is used to ensure all participants have a grasp of fundamental security principles, frameworks, and constructs. Topics covered include host and network security controls, security operations, security technologies, the intelligence life cycle, information sharing, the threat landscape, and a review of contemporary cyber breaches.

Prerequisites: An understanding of foundational IT concepts, such as the OSI and TCP/IP models and IT networking basics.

Course goals

After completing this course, participants should be able to:

  • Describe the Confidentiality, Integrity, and Availability (CIA) Triad and its principles
  • Recall the foundations of Authentication, Authorization, and Accounting (AAA)
  • Contrast different Cyber Threat types and actors
  • Discuss the MITRE ATT&CK Framework
  • Interpret security controls and their purpose
  • Describe the Cyber Threat Intelligence (CTI) cycle 
  • Evaluate and discuss the value of CTI 
  • Evaluate the purpose of a Security Operations Center (SOC)
  • Explain requirements for and discuss investigation types
  • Apply and discuss foundational security operations concepts
  • Examine and analyze the incident response (IR) cycle
  • Understand the role of CTI and Threat Hunting with the SOC 
  • Discuss and analyze disaster recovery processes
  • Review and discuss business continuity planning and exercising
  • Recall critical cyber threat incidents and breaches
  • Discuss security shortfalls and evaluate responses
  • Discuss future cyber threats

Who this course helps

This course is perfect for those with basic IT knowledge who want to learn cybersecurity fundamentals. Aspiring security analysts, IT professionals seeking to expand their skills, and managers involved in protecting organizational data will benefit. It is also valuable for those wanting to understand current cyber threats and defense mitigations. This course establishes a strong foundation, setting up junior cybersecurity professionals for success in our more advanced cybersecurity training programs.

How it works

Delivery method

In-classroom instructor-led training

Duration

  • Four days (in-person delivery)
  • Five days (virtual delivery)



Take the next step

Contact Mandiant Academy to learn more and schedule your course today.

Google Cloud