Upon completion of this course, the student will be proficient in:
• Network risk diagnosis and management
• Network alerts and alarms
• Protocols and access control
• Wireless and cloud security
• Privacy and storage in the cloud
• Cryptography and host security
• Malware and viruses
• Third-Party Integration
• Penetration Testing and Vulnerability Scanning
Price: $4,495.00


    Quantity:
    This program, offered by our accredited school partners, consists of the following:

    Security +
    CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in Network Security, Compliance and Operational Security, Threats and Vulnerabilities, Application, Data and Host Security, Access Control and Identity Management Cryptography.
    This course prepares for the Security+ certification exam SY0-501. Many corporations recommend or require the Security+ certification for their IT employees. Companies like Sun, IBM/Tivoli Software Group, Symantec, Motorola and Olympus Security Group know the value of a Security+ certification and recommend or require it of their IT employees.
    This course includes access to a hands-on Practice-Lab which will allow candidates to have training in the practical application of the course concepts without having to buy any additional software and will prepare them for success on the certification exam.

    Certified Information Systems Security Professional
    The Certified Information Systems Security Professional (CISSP) course is designed to ensure that someone handling computer security for a company or client has mastered a standardized body of knowledge. Certified Information Systems Security Professional (CISSP) has developed as the key certification for security professionals in government and industry. Corporations are seeking certified, experienced information security professionals to safeguard their information and assets. The CISSP® is considered the global standard that proves an individual's proficiency in several security disciplines. Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve.

    Real World Cybersecurity Scenarios
    What would you do in the face of an actual information security problem? These courses each include a module devoted to fictional scenarios, based on real-world challenges that cybersecurity professionals face. Each course is self-paced and contain interactive games, real-world examples, expert videos, quizzes, assessments, and focused instruction.
    Each of the courses in this bundle helps refine and enhance the skills that cybersecurity and IT professionals need. The concepts and principles covered focus attention on the needs of the expanding computer information security industry.
    This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful.

    Enroll through one of our accredited university or college partners today!
    CompTIA Security+ Module 1 - Risk, Monitoring, and Diagnosing Networks
    • Risk Related Concepts
    • Control Types
    • False Positives and Negatives
    • Risk Management
    • Implementing Policies
    • Understanding Control Types
    • Alarms
    • Alerts
    • Trends
    • Security Posture

    CompTIA Security+ Module 2 - Devices, Infrastructure, and Access Control
    • Mastering TCP/IP
    • OSI Resilience
    • Working with TCP/IP Suite
    • IPv4 and IPv5
    • Encapsulation
    • Protocols and Services
    • Securing Workstations
    • Access Control Basics
    • Identity Management
    • Network Access Control

    CompTIA Security+ Module 3 - Protecting the Wireless Networks and Securing the Cloud
    • Wireless Systems
    • Lightweight Extensible Authentication Protocol
    • Wireless Attacks
    • Access Points
    • Classifying Information
    • Private Cloud
    • Security and the Cloud
    • Host Availability
    • Sandboxing
    • Cloud Storage

    CompTIA Security+ Module 4 - Host, Data, Cryptography and Application Security
    • Application Hardening
    • Fuzzing
    • Secure Coding
    • Host Security
    • Database Technologies
    • Cryptography Overview
    • Modern Cryptography
    • Rainbow Tables and Salt
    • Key Stretching
    • Wi-Fi Encryption

    CompTIA Security+ Module 5 - Malware, Vulnerabilities, Social Engineering and Threats
    • Understanding Malware
    • Surviving Viruses
    • Types of Viruses
    • Spoofing Attacks
    • Understanding Social Engineering
    • Types of Social Engineering Attacks
    • What Motivates an Attack?
    • The Principles Behind Social Engineering
    • Social Engineering Attack Examples
    • Understanding Physical Security

    CompTIA Security+ Module 6 - Security Administration and Disaster Recovery
    • Understanding Physical Security
    • Third-Party Integration
    • Transitioning
    • Understanding Business Continuity
    • Impact Analysis
    • The Health Insurance Portability and Accountability Act
    • The Gramm-Leach-Bliley Act
    • The Computer Fraud and Abuse Act
    • Penetration Testing
    • Vulnerability Scanning

    Certified Information Systems Security Professional (CISSP) Module 1 - Access Control
    • Identification and Authentication Techniques
    • Access Control Techniques
    • Authorization Mechanisms
    • Access Control Attacks and Monitoring Authentication
    • Risk Elements
    • Preventing Access Control Attacks
    • Smart Cards
    • Biometrics
    • Security Operations Principals
    • Role-Based Access Controls
    • Centralized versus Decentralized Access Control
    • Assessing Effectiveness of Access Controls

    Certified Information Systems Security Professional (CISSP) Module 2 - Network Security
    • Secure Network Architecture and Securing Network Components
    • OSI Model
    • Secure Network Components
    • Cabling, Wireless, Topography and Communications Technology
    • System and Security Management
    • Secure Communications and Network Attacks
    • Network and Protocol Security
    • Virtual Private Network
    • Firewall Terms and Types
    • Web Security
    • Common Attacks
    • Remote Access Security

    Certified Information Systems Security Professional (CISSP) Module 3 - Information Security Governance and Risk Management
    • Security Governance Concepts, Principles, and Policies
    • Layering
    • Data Hiding
    • Control Frameworks
    • Security Management
    • Risk Management
    • Terminology
    • Qualitative/Quantitative Risk Analysis
    • Manage Personnel Security
    • Security Education and Training
    • Information Classification
    • Employment Policies
    • Change Management

    Certified Information Systems Security Professional (CISSP) Module 4 -Software Development and Malicious Applications
    • Application Issues
    • Databases and Data Warehousing
    • Data Information Storage
    • Knowledge Based Systems
    • System Development and Controls
    • Malicious Code and Application Attacks
    • Password Attacks
    • Applications Beyond the Database
    • Web Application Security
    • IP Probes
    • IP Spoofing
    • Vulnerabilities

    Certified Information Systems Security Professional (CISSP) Module 5 - Cryptography
    • Cryptography and Symmetric Key Algorithms
    • PKI and Cryptographic Applications
    • Cryptography Basics
    • Cryptanalysis Terms
    • Symmetric Encryption
    • Asymmetric Cryptography
    • Modern Cryptography
    • Public Key Infrastructures
    • Hash Functions
    • Digital Signatures
    • Protocol Based
    • Pretty Good Privacy
    • Cracking Techniques

    Certified Information Systems Security Professional (CISSP) Module 6 - Security Architecture and Design
    • Principles of Security Models, Design, and Capabilities
    • Security Architecture Vulnerabilities, Threats, and Countermeasures
    • Security Operations
    • Fundamentals of Security
    • Clark-Wilson Model
    • Objects and Subjects
    • Computer Architecture
    • Singe Points of Failure
    • Information Security Architecture
    • Common Security Issues
    • Security Operations
    • Resource Protection
    • Change and Configuration Management

    Certified Information Systems Security Professional (CISSP) Module 7 -Incident Management, Business Continuity and Disaster Recovery
    • Manage Incident Response
    • Preventative Measures
    • System Resilience
    • Reasons for Business Continuity Plans
    • Business Continuity Life Cycle
    • Project Scope and Planning
    • Business Impact Assessment
    • BCP Documentation
    • Nature of Disaster
    • Recovery Strategies
    • Data Redundancy
    • System Backups
    • Testing and Maintenance

    Certified Information Systems Security Professional (CISSP) Module 8 - Legal Requirements, Incidents and Ethics
    • Categories of Law
    • Compliance
    • Contracting and Procurement
    • Code of Ethics
    • Computer Crimes
    • Import/Export
    • Privacy
    • Major Categories of Computer Crimes
    • Incident Handling
    • Liability
    • Response Teams
    • Accessibility and Perimeter Security
    • Natural Disasters
    • Work Area
    • Internal Security
    • Boundary Protection
    • Course Summary

    Real World Cyber Security Scenarios
    • Network Security Scenarios
    • Cryptography Scenarios
    • Compliance and Operational Security Scenarios
    • Threats and Vulnerabilities Scenarios
    • Application, Data, and Host Security Scenarios
    • Access Control and Identity Management Scenarios
    All required reference materials are provided with this program. Technical requirements:

    Internet Connection
    • Broadband or High-Speed (DSL, Cable, Wireless)
    Hardware Requirements
    • Processor - 2GHz Processor or Higher
    • Memory - 1 GB RAM Minimum Recommended

    Software Requirements
    • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher
    • Microsoft Office 2007, 2010 or 2013 or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
    • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
    • Adobe PDF Reader
    CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career. CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability.
    Each state may have additional licensing requirements, be sure to research your states requirements for employment by visiting your states occupation board.
    This class is an independent-study course. Students will have all the resources needed to successfully complete the course within the online material. A student helpdesk is available for technical support during the course enrollment.

    Product Type:
    Bundle
    Course Type:
    Career Training Program
    Level:
    Beginner
    Language:
    English
    Hours:
    810
    Duration:
    12 months
    Avg Completion:
    6 Months

      Get the support you need, when you need it

        • Our admissions advisors will help you identify career paths, accredited colleges, and funding solutions
        • Customer & Technical Support is available throughout your course experience via Live Chat, Phone, Email, and Text
        • Office hours are Monday through Friday, 8-5pm CT

      Stay on track to reach your completion goal

        • Scheduling and Time Management assistance tailored just for you
        • Active reminder notifications about important deadlines in your class
        • Join giveaway raffles for achieving course milestones

      Become Job-Ready: Career Training Programs ONLY

        • Take advantage of real-world experience outside of the classroom with an employer-based externship program
        • Work with a career counselor to schedule your certification exam (if applicable)
        • Complete an employer-ready resume with a career coach
        • Participate in live mock interviews and job guidance sessions

      Cybersecurity Professional with Labs FAQs

      How do I request more information about a course?

      What is the difference between online courses and classroom courses?

      I'm not sure if I will be able to successfully take on online course, what should I do?

      Do I need a degree or high school diploma to take an online course?

      What do I need to take an online course?

      What format will my online course be in?

      Do I have to be local to take a course?

      Do you offer or accept any financial assistance options?

      What does the course duration mean?

      What does a Certification Voucher Included mean?

      When will I start my course?

      What type of support will I receive during my course?

      Who do I contact if I cannot access my course?

      When will I receive my course materials?

      Who do I contact if I need an extension?

      What do I receive when I complete my course?

      Will I receive any job search assistance or externship opportunity after I finish my course?