Gain Foundational knowledge of cybersecurity with CSX. Get to know cybersecurity’s key concepts and roles. Created by the industry’s leading minds, ISACA’s® Cybersecurity Nexus™ (CSX) is the only one-stop global resource for everything cybersecurity. CSX is designed to help fortify and advance the industry by educating, training and certifying a stronger, more informed workforce—from recent college graduates to C-suite level executives.
The entry point into the ISACA cybersecurity program, Cybersecurity Fundamentals offers a certificate in the introductory concepts that frame and define the standards, guidelines and practices of the industry. The certificate and related training are an ideal way to get started on a career in cybersecurity. These skills are in high demand, as threats continue to plague enterprises around the world. This knowledge-based certificate can enable you to:
- Demonstrate your understanding of the principles that frame and define cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data
- Add a credential to your resume/CV that will distinguish you from other candidates for advancement or a new job
- Stay ahead of the curve on your current career path or start your new cybersecurity career strong
The Cybersecurity Fundamentals course is an excellent way to gain foundational knowledge in cybersecurity and begin to build your knowledge and kick-start your career in this crucial area. It is also a great way to prepare to earn your Cybersecurity Fundamentals Certificate.
Cybersecurity Nexus (CSX) is a new program from ISACA designed for the most ambitious cybersecurity professionals, empowering them to elevate their work, take control of their career paths, and earn their place amongst the best.
The Cybersecurity Essentials program provides a dynamic learning experience where you’ll learn to:
- Explain the core information assurance (IA) principles.
- Identify the key components of cybersecurity network architecture.
- Apply cybersecurity architecture principles.
- Describe risk management processes and practices.
- Identify security tools and hardening techniques.
- Distinguish system and application security threats and vulnerabilities.
- Describe different classes of attacks.
- Define types of incidents including categories, responses and timelines for response.
- Describe new and emerging IT and IS technologies.
- Analyze threats and risks within context of the cybersecurity architecture.
- Appraise cybersecurity incidents to apply appropriate response.
- Evaluate decision making outcomes of cybersecurity scenarios.
- Access additional external resources to supplement knowledge of cybersecurity.