• Home
  • Course Catalog
  • Contact Us
Loading... Loading... Please wait...
Request info
Contact Us
First Name*
Last Name*
Email
Phone
Questions/Comments
Lead Status
Lead Source*
External Referrer
Partner SMEC ID
Enter text from the pic*

Certificate in CyberSecurity (IT-CYSEC-01)

$495.00

Course Description

This Certificate in Cybersecurity offers an introduction to the critical elements of information security, as well as foundational information about key certifications for professionals in the industry. Each of the eight courses in this suite will help learners master the vocabulary of the industry and offers examples, videos, interactive games, and review questions to ensure mastery of the material.

This program offers education and mastery in 8 Cyber Security domains:
Asset Security
Communications and Network Security
Identity and Access Management
Security and Risk Management
Security Assessment and Testing
Security Engineering
Security Operations
Software Development Security

Outline

This program offers education and mastery in 8 Cyber Security domains:

Asset Security
Communications and Network Security
Identity and Access Management
Security and Risk Management
Security Assessment and Testing
Security Engineering
Security Operations
Software Development Security

Asset Security:

This course introduces information technology's physical assets and their security. Information and software must be protected from threats, such as fire, water, and people with malicious intent. Through comparison of various physical access controls, and security practices, students of this course will be equipped with knowledge and strategies to prevent damage, maintain optimum environments and manage electrical problems.

Communications and Network Security:

This course contains a discussion of communications and network security. It covers the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks.

Identity and Access Management:

This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other.

Security and Risk Management:

This course contains a discussion of the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education.

Security Assessment and Testing:

This course contains a discussion of security assessment and testing, focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Students will have the opportunity to practice how to assess the impact of disasters that may arise as well as to develop their own versions of these plans.

Security Engineering:

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered.

Security Operations:

This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security.

Software Development Security:

This course covers software development security, while focusing on the systems development life cycle, operating systems and their environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. Students will have the opportunity to apply application security controls.

Duration

8 months

Hours

40

Audience

Ideal for Adult students with an interest or background in information technology.

Certification

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
The CISSP is ideal for those working in positions such as, but not limited to:

Security Consultant
Security Manager
IT Director/Manager
Security Auditor
Security Architect

Security Analyst
Security Systems Engineer
Chief Information Security Officer
Director of Security
Network Architect

Language

English

Instructor

The CyberSecurity program is supported by Educational Mentors. Our Educational Mentors have practical industry experience in the subject they mentor. Educational Mentors reviews student work, student progress, and interacts with students as needed. They respond to any questions or concerns you might have, as well as encouraging and motivating you to succeed.

Requirements

Alll materials are provided.

Find Similar Courses by Category