Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:


Cybersecurity Foundations

Investigate cybersecurity threats and master techniques needed to protect your network.

GK# 9701

Course Overview

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

In addition to technical cybersecurity components, you will learn and explore the non-technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training.

Delivery Format Options

  • Classroom Live

    Classroom Live

    Receive face-to-face instruction at one of our training center locations.


    $3495 CAD

    5 day

  • Virtual Classroom Live

    Virtual Classroom Live

    Experience expert-led online training from the convenience of your home, office or anywhere with an Internet connection.


    $3395 CAD

    5 day

  • Private Group Training

    Private Group Training

    Train your entire team in a private, coordinated professional development session at the location of your choice.

    Receive private training for teams online and in-person.

Request a date or location for this course.

What You'll Learn

  • Current cyber threats and cybersecurity site references
  • Government-mandated directives and compliance requirements
  • Cyber roles required to successfully design secure systems
  • The attack cycle perpetrated by malicious hackers
  • Enterprise policy requirements
  • Best strategies for securing the enterprise with layered defenses
  • How security zones and detailed logging augment information assurance
  • Forensic challenges and incident response planning
  • Risk management process
  • Goals achievable with auditing, scanning, and testing systems
  • Industry recommendations for maintaining secure access control
  • Standards-based cryptographic solutions for securing communications

Follow-On Courses

Any advanced or specialized security course, such as:


TCP/IP Networking or equivalent knowledge

Who Needs To Attend

Cybersecurity professionals, including security analysts, intel analysts, policy analysts, security operations personnel, network administrators, system integrators, VARS, and security consultants

Course Outline

Download Course Outline