- Description
- Objectives
- Outline
- Materials
- Certification
- System Requirements
- Watch a Demo
This program teaches students the skills, knowledge and credentials required to successfully begin a career in the fields of Information Technology and Cybersecurity.
Cybersecurity
After completing this course, you should be able to:
- Identify best practices, standards, and plans of action for information security
- Discuss effective and appropriate ways to perform risk assessments and security management
- Recall access control methods and security guidelines
- Recall elements of the cybersecurity function needed for security requirements
- Recognize techniques for auditing and monitoring cybersecurity controls
Cybersecurity
Cybersecurity Module 1
Best Practices and Standards
- Value of Standards and Best Practices Documents
- Standard of Good Practice for Information Security
- ISO/IEC 27000 Suite of Information Security Standards
- NIST Cybersecurity Framework and Security Documents
- CIS Critical Security Controls
- COBIT 5 for Information Security
- Payment Card Industry Data Security Standard (PCI DSS)
- ITU-T Security Documents
- Effective Cybersecurity
Cybersecurity Module 2
Planning for Cybersecurity
- Security Governance and Security Management
- Security Governance Principles and Desired Outcomes
- Risk Assessment Concepts
- Threat and Control Identification
- Vulnerability Identification
- Impact and Risk Assessment
- Security Management Function
- Security and Acceptable Use Policy
Cybersecurity Module 3
Managing Cybersecurity Functions
- Human Resource Security
- People Management Best Practices
- Information Classification and Handling
- Privacy
- Document and Records Management
- Sensitive Physical Management
- Information Management Best Practices
- Hardware Life Cycle Management
- Industrial Control Systems
- Mobile Device Security
Cybersecurity Module 4
System Development and Access
- System Development Life Cycle
- System Development Management and Best Practices
- Business Application Management Concepts
- Corporate Business Application Security
- End User-Developed Applications
- System Access Controls
- User Authentication
- Password-Based Authentication
- Possession-Based Authentication
- Biometric Authentication
- Access Control
Cybersecurity Module 5
System and Network Management
- Server Configuration
- Virtual Servers
- Network Storage Systems
- Backup
- Change Management
- Network Management Concepts
- Virtual Private Networks and IP Security
- Electronic Communications
- Supply Chain Management
- Cloud Security
Cybersecurity Module 6
Technical and Threat Management
- Security Architecture
- Malware Protection Software
- Identity and Access Management
- Digital Rights Management
- Threat and Incident Management
- Threat Intelligence
- Cyber Attack Protection
- Local Environment Security
- Business Continuity Concepts
Cybersecurity Module 7
Security Assessment
- Security Monitoring and Improvement
- Security Audit
- Security Performance
- Security Monitoring Best Practices
- Security Improvement Best Practices
All course materials included.
Cybersecurity
Internet Connection
- Broadband or High-Speed - DSL, Cable, and Wireless Connections
*Dial-Up internet connections will result in a diminished online experience. Classroom pages may load slowly and viewing large audio and video files may not be possible.
Hardware Requirements
- Processor - 2GHz Processor or Higher
- Memory - 1 GB RAM Minimum Recommended
* While our courses are accessible through multiple mobile learning platforms, some courses may include a CD or DVD with the Textbook, so you may need access to a computer with CD-ROM or DVD Drive.
PC Software Requirements
- Operating Systems - Windows 7 or higher
- Microsoft Office 2007 or higher. Also, you could use a general Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
- Internet Browsers - Google Chrome is highly recommended
- Cookies MUST be enabled
- Pop-ups MUST be allowed (Pop-up Blocker disabled)
- Kindle Reader App is needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
- PowerPoint Viewer (if you do not have PowerPoint)
- Adobe PDF Reader
- QuickTime, Windows Media Player &/or Real Player
MAC Software Requirements
- Operating Systems - Mac OS x 10 or higher with Windows
- Mac office programs or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
- Internet Browsers- Google Chrome is highly recommended
- Cookies MUST be enabled
- Pop-ups MUST be allowed (Pop-up Blocker disabled)
- Kindle Reader App is needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
- PowerPoint Viewer (if you do not have PowerPoint)
- Adobe PDF Reader
- Apple QuickTime Media Player
- Courses that include a CD-ROM or DVD may require an external drive and Parallels software to view.