Workforce Education Solutions
Training & Development

Sign In   |   View Cart   |     |   Help
Home  
 
Return to Course Catalog

Course Catalog > Cybersecurity >

Other Cybersecurity

Other Cybersecurity

  

 

  • A Manager's Guide to Cloud Computing and Cybersecurity
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course provides an overview of cloud computing and the business and security considerations of transitioning to a cloud environment or from one cloud service provider to another. The course is presented in two modules. In addition to providing information that aligns with industry standard content from the Cloud Security Alliance, this course also includes a module that presents different real-world scenarios to learners, asking them to apply what they have learned to situations they might encounter in the workplace.

    This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as the first of a five-course suite, it can be taken as a stand-alone course.

 

  • Application Development for Cloud Computing
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course is intended to provide professionals who have some technical experience an overview of the application development process, how it applies to cloud computing, and the prevalent security concerns related to today's applications. It is not a software engineering course and does not require any programming knowledge.

    The content of this course covers much of the Application Security domain developed by the (ISC)2 and Cloud Security Alliance as part of the Cloud Computing Security Practitioner (CCSP) exam and certification. Further, the course also incorporates content that may be found on the CompTIA Cloud+ exam. As such, it should serve as useful preparation for anyone pursuing these certifications.

 

  • Application, Data, and Host Security Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.

 

  • Certificate in Cybersecurity
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $499.00

    Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft, and destruction. Failures of cybersecurity policies, both in large corporations and governmental agencies, have earned significant visibility and negative publicity in recent months and years. As the amount of data being stored continues to increase, and as hackers become more sophisticated, the need for cybersecurity is greater than ever.

    This Certificate in Cybersecurity offers lessons on the critical elements of information security, as well as foundational information about key certifications for professionals in the industry. Each of the eight courses in this suite will help learners master the vocabulary of the industry and offers examples, videos, interactive games, and review questions to ensure mastery of the material.

    Courses can be taken in any order. Upon successful completion, you can download and print a Certificate of Completion.

 

  • Cloud Data Security
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course is comprised of two modules. The first addresses many of the important concepts of cloud-based data and the security responsibilities of both cloud consumers and cloud service providers. The second module offers a series of scenarios that relate to cloud data security to ensure you have mastered the material.

    This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course.

 

  • Cryptography Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $79.00

    This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.

    This course is part of the Cybersecurity suite of courses. However, the course can be taken as a stand-alone course.

     

 

  • Introduction to Cybersecurity
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $99.00

    Globally, incidents of data breaches, identity thefts, and cybercrimes are on the rise, along with the explosive growth of online personal data and the expansion of computer networks. This course teaches the fundamental concepts of information security one will encounter in the cybersecurity field. This course will set the groundwork with basic vocabulary and then introduces concepts such as access controls, risk management, cyber attacks, and digital forensics. This course requires a basic understanding of IT concepts.

 

  • Real-World Cybersecurity Scenarios
  • Registration: Open Enrollment
    Delivery Method: Online
    Fee: $399.00

    What would you do in the face of an actual information security problem? These courses each include a module devoted to fictional scenarios, based on real-world challenges that cybersecurity professionals face. Each course is self-paced and contain interactive games, real-world examples, expert videos, quizzes, assessments, and focused instruction. Each of the courses in this bundle helps refine and enhance the skills that cybersecurity and IT professionals need. The concepts and principles covered focus attention on the needs of the expanding computer information security industry. This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful.