Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft and destruction. This certificate offers lessons on the critical elements of information security, as well as foundational information about key certifications for professionals in the industry. Each of the eight classes in this suite will help learners master the vocabulary of the industry and offers examples, videos, interactive games and review questions to ensure mastery of the material.
Courses included in the Cybersecurity Certificate:
- Communication and Network Security
This course covers topics related to communications and network security. Begin with a lesson in the different types of networks and different transmission technologies. Covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners who are interested in gaining an introduction to information technology security.
- Asset Security
Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Various security controls will be described that help protect privacy, along with data leakage prevention (DLP).
- Security and Risk Management
This course covers the role of governance and risk management in information security. Look at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. Take a look at how modern organizations manage information security risks and how to conduct a risk analysis.
- Security Engineering
Gain the key concepts of cryptography and security engineering. Examine the role of encryption in information security and considers common encryption methods. This course discusses ciphers, their substitutes, how they work, public key infrastructure and management.
- Identity and Access Management
Introduce principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other.
- Security Assessment and Testing
This course covers security assessment and testing, focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Practice how to assess the impact of disasters that may arise as well as to develop your own versions of these plans.
- Security Operations
This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. Establish a foundation in auditing, monitoring and detection in information security.
- Software Development Security
This course covers software development security while focusing on the systems development life cycle, operating systems, and their environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. Students will have the opportunity to apply application security controls.
Course Dates and Times
|Date and Times||Location||Course Cost/Fees|
|Register to get started today!||Online Course||$499|
Course Hours: 40 Hours
This workshop is offered through our continuing education online partner.