55374A – Fundamentals of Cybersecurity and Zero Trust


About this course

This one-day instructor-led course is intended for IT professionals who are interested in expanding their knowledge and awareness of cybersecurity. In this course, the student will begin to understand the complexities of cybersecurity including the cybersecurity landscape, cryptography, and how users, devices, applications, and networks can influence the effectiveness of the security perimeter. They’ll then see how the use of a Zero Trust framework as an overarching strategy can bolster and improve their cybersecurity perimeter.

Course Outline


SKU: 55374A Categories: , , Tag:


Audience Profile

This course is intended for both novice and experienced IT professionals who want to explore the nature of cybersecurity and obtain a basic understanding of the current state of cybersecurity and the strategies that can help strengthen an organization’s security perimeter.

At Course Completion

After completing this course, students will be able to:

  • Understand and describe the cybersecurity landscape.
  • Discuss how encryption works, and understand its broader uses in protecting your data.
  • Describe the differences between authentication and authorization.
  • Describe different network types, the network threat landscape, and how to protect them from cyberattacks.
  • Understand what a device is, how much a device knows about you, and how to reduce possible threats.
  • Understand how applications can be exploited to gain access to your data and assets.
  • Describe the benefits of using a Zero Trust strategy to protect an organization’s digital estate.


  • Basic awareness of IT, devices, and applications

Course Outline