Workforce Education Solutions
Training & Development

Sign In   |   View Cart   |     |   Help
Home  
 
Return to Course Catalog

Course Catalog > Cybersecurity >

Access Control & Asset Security

Access Control & Asset Security

  

 

  • Access Control and Identity Management Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.

 

 

 

  • Asset Security
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel down to front line employees. Various security controls will be described that help protect privacy, along with data leakage prevention (DLP). Although it is not necessary, having some foundation in IT concepts is helpful in taking this course.

    The content in this course aligns with Domain Two in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

  • Fundamentals of Application Security
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    The assignments in this course introduce many of the concepts of application development and the security issues that relate to them. The course covers various software development models and considerations and introduces learners to basic security concepts such a cryptography and the common vulnerabilities and exposures list. In this material, we will also introduce the basic concepts of cybersecurity, including cryptography, and illustrate how the many vulnerabilities found in applications today can trace their origin to some point in the development process.

    While this is not a "coding" course, it provides examples of coding techniques and explores and contrasts the many different models of software development. Ultimately, this content should prove valuable to managers, developers, and security professionals who are looking for a comprehensive understanding of how the many components of the application creation process come together under an umbrella of security.


 

  • Identity and Access Management
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other. This course requires some basic understanding of IT concepts. 

    The content in this course aligns with Domain Five in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

 

 

 

 

  • Network Security Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.

 

  • Security Assessment and Testing
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course covers security assessment and testing, focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Students will have the opportunity to practice how to assess the impact of disasters that may arise as well as to develop their own versions of these plans. This course requires a basic understanding of IT concepts.

 

  • Security Awareness Training
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $15.00

    MindEdge's Security Awareness Online Training teaches employees to identify and prevent security breaches before they happen. For four cents per day per employee, your staff will have year-long, anytime, anywhere access to our highly-rated online security awareness training. This comprehensive training spans the facets of security awareness from in-office to remote security, email to phishing attacks, malware to ransomware, cloud to social media, and more.

 

  • Security Engineering
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered. This course requires a basic understanding of IT concepts.

    The content in this course aligns with Domain Three in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

  • Security Operations
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.

    The content in this course aligns with Domain Seven in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.