Street to Cyber: FREE Cyber Security Training

On any given day in Arizona there are hundreds of open, unfilled jobs in the field of cyber security.  These jobs have average salaries from $55,000 to $172,000 per year.  For many disadvantaged members of our Phoenix community these jobs may appear to be out of reach due to financial or other challenges.

Cyber Security Training and Consulting LLC has launched a FREE Cyber Security Fundamentals Professional (CSFP) certification boot camp training program designed to remove the financial barrier for those wishing to enter the cyber security field.

Program enrollment is limited to 50 students per course. All disadvantaged members of the Phoenix metropolitan area are welcome.  This includes, but is not limited to, Active Duty, Reserve, and Veteran military members and their spouses, law enforcement officers and their spouses, teachers and their spouses, and any other person in unfavorable circumstances, especially with regard to financial or social opportunities.

We do not require students to provide proof of their disadvantaged status.

Cyber Security Fundamentals Professional (CSFP)

  • Certification Level: Foundation | Cybersecurity Knowledge| Green Cyberwolf
  • Certificate Title: Cybersecurity Fundamentals Certified
  • Delivery Method: Live, Remote Online
  • COMMUNITY EDITION: Two Weekend Boot Camp | 9:00 a.m. – 5:00 p.m. | Four Total Days
  • 28 Professional Development Units
  • Laptop Required​

NOTE: Students may register for any of the sessions that best meet their schedule.  Modules may be re-taken up to four times.


NOTE: This course covers all subject areas (and more) to adequately prepares a student to pass the ISACA® Cybersecurity Nexus (CSX)™ Fundamentals certification exam.

Globally, the demand for cybersecurity professionals exceeds the number of available qualified personnel. “The talent shortage is very bad because of the new surge in demand coupled with the small supply of well-trained cyber professionals,” says Mark O’Reilly, Asia managing director of a recruitment agency.

​The Certified Information Systems Security Professional (CISSP) designation is an excellent path to pursue, however, it requires five years of experience in information security. We developed this course as the first step a person would take to begin a career in information security.

This course is designed to rapidly introduce students to the fundamentals of cybersecurity using the eight (8) (ISC)²® CISSP® and five (5) ISACA CSX Cybersecurity Fundamentals certification domains as a foundation including:

  • CISSP Domains
    • Security and Risk Management
    • Asset Security
    • Security Engineering
    • Communication and Network Security
    • Identity and Access Management
    • Security Assessment and Testing
    • Security Operations
    • Software Development Security
  • CSX Cybersecurity Fundamentals Domains
    • Cybersecurity Concepts
    • Cybersecurity Architecture Principles
    • Security of Networks, Systems, Applications, and Data
    • Incident Response
    • Security Implications and Adoption of Evolving Technology


Module 1 (Saturday)

  • What is cybersecurity?
  • Why is cybersecurity important?
  • What type of person are you?
    • Personality traits of cybersecurity pros
  • What role will you play in cybersecurity?
    • Typical cybersecurity functions
  • Industry certifications and typical salaries
  • Fundamentals of information technology
  • Common information security terms
  • Security and Risk Management

Module 2 (Sunday)

  • Asset Security
    • Protecting the security of assets including the implications of bring-your-own-device (BYOD); hardening of assets and data protection; and the role of change and configuration management.
  • Identity and Access Management
    • The differences between identity and access management, the role access control plays, and common access control models.
  • Communication and Network Security
    • Designing and protecting network security, network isolation and segmentation, the fundamentals of OSI and TCP, switches, firewalls, IDS vs. IPS, subnetting, IT vs. OT considerations, wireless networks and cloud security.​

Module 3 (Saturday)

  • Security Engineering
    • Engineering and management of security through principles of secure design, security architecture and related threats, and cryptography.
  • Software Development Security
    • Understanding, applying and enforcing software security through a software development life cycle, the software assurance maturity model, database management systems, database threats and controls, and web application development threats and protections.

Module 4 (Sunday)

  • Security Assessment and Testing
    • Designing, performing and analyzing security through assessments and different test strategies, security controls testing, verification vs. validation, and event logging and correlations.
  • Security Operations
    • Foundational concepts, investigations, incident management, and disaster recovery including the difference between events, alerts and incidents, the anatomy of a cyber attack and a cyber incident response, CERT attack vectors and incident categories, incident response triage activities, and digital forensics.


  • Students should have a basic understanding of computers and the internet.

Why Choose Our Course?

The demand for skilled cybersecurity professionals is not going to lessen in the future. To help companies meet this demand we designed this course to give students their first introduction to the major aspects of information security. This course is ideal for anyone who wants to enter the interesting and diverse field of information security.  Not every aspect of information security requires a person to be a technology expert and this course will help students better understand which facet is best suited for them.

What You Will Receive

In this course, you will receive the following:

  • A digital rights protected electronic copy of the course material

You Will Be Able To

  • Understand and discuss the eight CISSP / five CSX Fundamentals information security domains
  • Express in detail how their employment background or personal traits align to careers within cybersecurity

Author Statement

I developed this course to help companies meet the overwhelming demand for cybersecurity professionals.  Unfortunately, there just are not enough people coming out of universities to keep up with the need so I wanted to help people jumpstart a career in information security. This course is also excellent for those that have gained various bits of information security knowledge but who really need to establish a solid foundation and help them connect the cyber security dots.  This course really lays the foundation for all other topics within information security and will help students figure out which areas of most interest to them and which ones they may be best suited for.