Edu type:
Course or training
Associate degree (EQF 5), Bachelor (EQF 6), MBO-4/HAVO/VWO (EQF 4)
Start date:
any time
Study Load:
8 hrs
1 day
More information


Get up to Speed With Cybersecurity Concepts, Roles and Language
ISACA defines cybersecurity as the protection of internet-connected systems such as hardware, software and data from cyberthreats. Individuals and enterprises use their understanding of cybersecurity practices and the cyberthreat environment to protect against unauthorized access to data centers and other computerized systems.


Today more than ever, cybersecurity touches and impacts every business and every role in technology. Professionals across IT and business need to understand its principles and how to communicate about cybersecurity with practitioners, managers and leadership within their organizations.


What is Cybersecurity Fundamentals?

Cybersecurity Fundamentals offers the practical guidance every rising IT professional needs to be aware of, be fluent in communicating and able to avoid many of the pitfalls and risks that cybersecurity presents. Get in the cyber know through the program’s hybrid knowledge and performance-based learning. Gain insight into the principles of data and technologies that frame and define cybersecurity, its language and the integral role of cybersecurity professionals in protecting enterprise data and infrastructure.


Train at your own pace with the Cybersecurity Fundamentals Online Course that you can access anytime, from anywhere.


The interactive, self-guided course blends both knowledge and performance-based training components. This blend of knowledge growth and hands-on application provides a truly unique and dynamic learning experience that builds and reinforces the critical skills required to perform many of the technical tasks that the IT work environment demands.


At the completion of this course learners will be able to: 

  • Explain key concepts and components of cybersecurity
  • Identify the key components of cybersecurity network architecture
  • Describe risk management processes and practices
  • Identify security tools, threats and vulnerabilities
  • Describe different classes of attacks
  • Describe new and emerging technologies 
  • Analyze threats and risks
  • Appraise cybersecurity incidents 

Online training labs included: 

  • Files Hashes
  • Bit locker
  • Password Recovery
  • SSH