Upon completion of this course, students will be able to: • Protect physical security assets by preventing damage, maintaining optimum environments and managing electrical problems • Protect information through network protocols and devices, including firewalls and wireless networks • Employ authentication techniques • Analyze and manage risks • Handle encryption in information security • Protect databases in security
Price: $495.00


    Quantity:
    This Certificate in Cybersecurity offers an introduction to the critical elements of information security, as well as foundational information about key certifications for professionals in the industry. Each of the eight courses in this suite will help learners master the vocabulary of the industry and offers examples, videos, interactive games, and review questions to ensure mastery of the material. This program, offered by our accredited school partners, offers education and mastery in 8 Cyber Security domains: Asset Security Communications and Network Security Identity and Access Management Security and Risk Management Security Assessment and Testing Security Engineering Security Operations Software Development Security Asset Security: This course introduces information technology's physical assets and their security. Information and software must be protected from threats, such as fire, water, and people with malicious intent. Through comparison of various physical access controls, and security practices, students of this course will be equipped with knowledge and strategies to prevent damage, maintain optimum environments and manage electrical problems. Communications and Network Security: This course contains a discussion of communications and network security. It covers the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. Identity and Access Management: This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other. Security and Risk Management: This course contains a discussion of the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education. Security Assessment and Testing: This course contains a discussion of security assessment and testing, focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Students will have the opportunity to practice how to assess the impact of disasters that may arise as well as to develop their own versions of these plans. Security Engineering: This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered. Security Operations: This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. Software Development Security: This course covers software development security, while focusing on the systems development life cycle, operating systems and their environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. Students will have the opportunity to apply application security controls. Upon completion students will be ready to take and pass the Certified Information Systems Security Professional (CISSP) Certification. Enroll through one of our accredited university or college partners today!
    Modules covering the 8 Cybersecurity domains: Module 1: Asset Security Module 2: Communications and Network Security Module 3: Identity and Access Management Module 4: Security and Risk Management Module 5: Security Assessment and Testing Module 6: Security Engineering Module 7: Security Operations Module 8: Software Development Security
    All required reference materials are provided with this program. Technical requirements: Internet Connection • Broadband or High-Speed (DSL, Cable, Wireless) Hardware Requirements • Processor - 2GHz Processor or Higher • Memory - 1 GB RAM Minimum Recommended Software Requirements • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher • Microsoft Office 2007, 2010 or 2013 or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx) • Internet Browsers - Google Chrome is highly recommended • Cookies MUST be enabled • Pop-ups MUST be allowed (Pop-up Blocker disabled) • Adobe PDF Reader
    The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. The CISSP is ideal for those working in positions such as, but not limited to: Security Consultant Security Manager IT Director/Manager Security Auditor Security Architect Security Analyst Security Systems Engineer Chief Information Security Officer Director of Security Network Architect
    This class is an independent-study course. Students will have all the resources needed to successfully complete the course within the online material. A student helpdesk is available for technical support during the course enrollment.

    Product Type:
    Course
    Course Type:
    Career Training Program
    Level:
    Beginner
    Language:
    English
    Hours:
    40
    Duration:
    8 months
    Avg Completion:
    5 Months

      • 100% Online, Self-Paced
      • Open Enrollment
      • Admissions and Student Support
      • Multimedia Rich and Interactive Content
      • Industry Certification Exam, when applicable
      • Hands-on Opportunity Upon Completion

      Certificate in Cybersecurity FAQs

      How do I request more information about a course?

      What is the difference between online courses and classroom courses?

      I'm not sure if I will be able to successfully take on online course, what should I do?

      Do I need a degree or high school diploma to take an online course?

      What do I need to take an online course?

      What format will my online course be in?

      Do I have to be local to take a course?

      Do you offer or accept any financial assistance options?

      What does the course duration mean?

      What does a Certification Voucher Included mean?

      When will I start my course?

      What type of support will I receive during my course?

      Who do I contact if I cannot access my course?

      When will I receive my course materials?

      Who do I contact if I need an extension?

      What do I receive when I complete my course?

      Will I receive any job search assistance or externship opportunity after I finish my course?