• CATALOG
  • FINANCIAL ASSISTANCE
  • MILITARY
  • LOGIN
Home > Training Programs > Security > Information Security Master Certification Training (Vouchers Included)
CALL
NOW

855.520.6806

Fill out the form below

Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

Information Security Master Certification Training (Vouchers Included)

it-security-certifications
$5,695.00 (USD)

OVERVIEW

DETAILS

OUTLINE

Cisco CCNA Security

I.     Introduction
II.     Network Security Basics I
III.     Network Security Basics II
IV.     Securing Network Devices I
V.     Securing Network Devices Lab I
VI.     IOS Enhancement Lab
VII.     Securing Network Devices II
VIII.     Securing Network Devices Lab II
IX.     Using CCP to Configure SNMP Lab
X.     Say Hello to AAA
XI.     Local AAA
XII.     Configuring Local AAA with CCP
XIII.     Firewall Basics Using ACLs
XIV.     Intro Firewall
XV.     Content Based Access Control Firewall
XVI.     Zoned Based Firewalls
XVII.     Zoned Based Firewalls Lab
XVIII.     Configuring Advanced Firewall with CCP
XIX.     Securing The LAN
XX.     Welcome to Cryto
XXI.     VPN
XXII.     Remote Access VPNS
XXIII.     VPN Lab
XXIV.     Managing A Secure Network
XXV.     Outro
XXVI.     Live Labs

CompTIA Advanced Security Practitioner (CASP)

I.     Underlying Security Models
II.     Selecting Security
III.     Cryptography
IV.     Storage
V.     Virtual Computing
VI.     Module 6: IPv6
VII.     Remote Access Security
VIII.     Domain Name System
IX.     Directory Services
X.     Firewall and VPN
XI.     Security Configuration Management
XII.     Network Infrastructure Security
XIII.     Secure Web Services
XIV.     Buffer Overflows
XV.     SQL Injection
XVI.     Access Control
XVII.     Single Sign-On
XVIII.     Risk Assessment
XIX.     Testing and Assessment
XX.     Common Vulnerability
XXI.     Common Criteria
XXII.     Personally Identifiable Information
XXIII.     Risk Management
XXIV.     Frameworks
XXV.     Interconnecting Systems
XXVI.     Security Services
XXVII.     Continuous Monitoring
XXVIII.     Incident Handling
XXIX.     Forensic & Incident Response
XXX.     Requirements Processing
XXXI.     Standards Bodies
XXXII.     Secure System Life Cycle
XXXIII.     Email
XXXIV.     Mobile and BYOD
XXXV.     Voiceover IP
XXXVI.     Physical Facilities Assessment Process
XXXVII.     Security Requirements Traceability Matrix
XXXVIII.     Live Labs


Certificate of Cloud Security Knowledge (CCSK)

I.     Architecture
II.     Governance and Enterprise Risk
III.     Legal Issues - Contracts and Electronic
IV.     Compliance and Audit Management
V.     Information Management and Data Security
VI.     Interoperability and Portability
VII.     Traditional Security, Business Continuity, and Disaster Recovery
VIII.     Data Center Operations
IX.     Incident Response
X.     Application Security
XI.     Encryption and Key Management
XII.     Identity, Entitlement, and Access Management
XIII.     Virtualization
XIV.     Security as a Service


Certified Information Systems Auditor (CISA)


I. Module 1
                A.    Introduction
                B.    Audit Process
                C.    Auditing Standards
                D.    Auditing Guidelines
                E.    Cobit Model
                F.    Audit Management
                G.    Internal Control Classifications
                H.    Planning
                I.    Program
                J.    Evidence
                K.    Audit Control Evaluation
                L.    C S A Control Self- Assessment

II.  Module 2
                A.    IT Governance
                B.    Outsourcing and Governance
                C.    IT Strategy
                D.    Governance and Security Policies
                E.    Organizational Compliance
                F.    Outsourcing and Globalization
                G.    Outsourcing
                H.    IT Performance

III.  Module 3
                A.    System and Infrastructure
                B.    Requirements
                C.    Project Management Tools- Part 1
                D.    Project Management Tools- Part 2
                E.    Applications
                F.    Agile Development
                G.    Monitoring and Controlling
                H.    Acquisition Process
                I.    Testing Process
                J.    Information Systems Maintenance Practices
                K.    Data Conversion Tools

IV. Module 4
                A.    Media Disposal Process
                B.    Post Implementation Review
                C.    Periodic Review
                D.    System Maintenance

V. Module 5
                A.    IT Service Delivery and Support
                B.    How to Evaluate Service Level Management Practices
                C.    Operations Management
                D.    Databases
                E.    Structured Query Language
                F.    Monitoring Performance
                G.    Source Code and Performance Monitoring
                H.    Patch Management
                I.    Incident Management
                J.    Hardware Component Types
                K.    Network Component Types

VI. Module 6
                A.    I S Auditor Technical Overview
                B.    Security Design
                C.    Monitoring Systems
                D.    Types of Attacks
                E.    Cryptography
                F.    Encryption
                G.    Asymmetric Encryption
                H.    Digital Certificate
                I.    Different Kinds of Attacks
                J.    Access Controls
                K.    Identification and Authentication
                L.    Physical Access Exposure
                M.    Environmental Security
                N.    Network Security Devices and Network Components
                O.    Network Address Translation
                P.    Virtual Private Networks
                Q.    Voice System Risks
                R.    Intrusion Detection
                S.    Firewalls
                T.    Firewall Implementation
                U.    Network Access Protection
                V.    Honey Pot
                W.    Risks to Portable and Wireless Devices
                X.    Bluetooth
                Y.    OSI Networking
                Z.    Managing Data

VII. Module 7
                A.    Business Continuity and Disaster Recovery
                B.    Fault Tolerance
                C.    Business Continuity and Disaster Recovery Regulations


PMI Risk Management Professional

I.     Introduction
II.     Risk Management Concepts
III.      Risk Management Environment
IV.     Project Definition
V.     Risk Management Planning
VI.     Risk Identification
VII.     Qualitative Risk Analysis
VIII.     Quantitative Risk Analysis
IX.     Risk Response Planning
X.     Risk Monitoring and Controlling
XI.     Certified Information Security Manager (CISM)
XII.     Information Security Governance
XIII.     Risk Management
XIV.     Information Security Program Development
XV.     Information Security Program Implementation
XVI.     Information Security Program Management
XVII.     Incident Management and Response


Certified Information Systems Security Professional (CISSP)

I.     Security and Risk Management
II.     Asset Security
III.     Security Engineering
IV.     Communication and Network Security
V.     Identity and Access Management
VI.     Security Assessment Testing
VII.     Security Operations
VIII.     Software Development Security

REQUIREMENTS

PREREQUISITES

INSTRUCTOR

FAQS

Albany Technical College

1704 S. Slappey Blvd.
Albany, GA 31701 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.