Workforce Education Solutions
Training & Development

Sign In   |   View Cart   |     |   Help
Home  
 
Return to Course Catalog

Course Catalog > Information Technology (IT) >

Application & Network Security

Application & Network Security

  

 

  • Access Control and Identity Management Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.

 

 

 

  • Application, Data, and Host Security Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.

 

  • Asset Security
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel down to front line employees. Various security controls will be described that help protect privacy, along with data leakage prevention (DLP). Although it is not necessary, having some foundation in IT concepts is helpful in taking this course.

    The content in this course aligns with Domain Two in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

  • Communication and Network Security
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course covers topics related to communications and network security. It begins with a lesson in the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners who are interested in gaining an introduction to information technology security.

    The content in this course aligns with Domain Four in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

  • Compliance and Operational Security Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. This course also features a number of fictional scenarios based on compliance and operational security to allow you to practice the concepts learned in the material. This course requires some basic understanding of IT concepts.

 

  • Identity and Access Management
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other. This course requires some basic understanding of IT concepts. 

    The content in this course aligns with Domain Five in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

 

 

  • Introduction to Malware
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    Malicious software, better known as malware, has become a central element in not just cybersecurity but daily life. It has played a role in everything from our politics to our economy, to our personal lives. However, it remains a poorly understood and reported subject. This course provides a clear and comprehensive introduction to malware and how to defend against it. Instruction is divided into two modules. The first provides an overview of the history and mechanisms of malware. The second module offers a series of real-world scenarios in which the learner must apply several of the concepts covered in the first module.

 

 

 

  • Network Security Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.

 

  • Security Assessment and Testing
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course covers security assessment and testing, focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Students will have the opportunity to practice how to assess the impact of disasters that may arise as well as to develop their own versions of these plans. This course requires a basic understanding of IT concepts.

 

  • Security Engineering
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered. This course requires a basic understanding of IT concepts.

    The content in this course aligns with Domain Three in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

  • Security Operations
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.

    The content in this course aligns with Domain Seven in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

  • Threats and Vulnerabilities Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real world scenarios.