Feather River Community College
Home > Training Programs > Security > IT Security Survival Training


Fill out the form below

Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

IT Security Survival Training

$1,995.00 (USD)





I.     Networking Terminology
II.     Locking Down or Network
III.     Wireless
IV.     Intro to Security Terminology
V.     Policies and Standards
VI.     Physical Security
VII.     Risk Analysis
VIII.     Disaster Recovery, Business Continuity and BIA (Business Impact Analysis)
IX.     Introduction to Computer Forensics
X.     Types of Attacks
XI.     System Security Threats
XII.     Security Assessments
XIII.     Monitoring and Auditing
XIV.     Authentication
XV.     Access Control
XVI.     Mitigating Security Threats
XVII.     Implementing System Security
XVIII.     Cryptography
XIX.     Public Key Infrastructure
XX.     Live Labs

Cisco CCNA Security

I.     Introduction
II.     Network Security Basics I
III.     Network Security Basics II
IV.     Securing Network Devices I
V.     Securing Network Devices Lab I
VI.     IOS Enhancement Lab
VII.     Securing Network Devices II
VIII.     Securing Network Devices Lab II
IX.     Using CCP to Configure SNMP Lab
X.     Say Hello to AAA
XI.     Local AA
XII.     Configuring Local AAA with CCP
XIII.     Firewall Basics Using ACLs
XIV.     Intro Firewall
XV.     Content Based Access Control Firewall
XVI.     Zoned Based Firewalls
XVII.     Zoned Based Firewalls Lab
XVIII.     Configuring Advanced Firewall with CCP
XIX.     Securing The LAN
XX.     Welcome to Cryto
XXI.     VPN
XXII.     Remote Access VPNS
XXIII.     VPN Lab
XXIV.     Managing A Secure Network
XXV.     Outro
XXVI.     Live Labs

Certificate of Cloud Security Knowledge (CCSK)

I. Architecture
II. Governance and Enterprise Risk
III. Legal Issues - Contracts and Electronic
IV. Compliance and Audit Management
V. Information Management and Data Security
VI. Interoperability and Portability
VII. Traditional Security, Business Continuity, and Disaster Recovery
VIII. Data Center Operations
IX. Incident Response
X. Application Security
XI. Encryption and Key Management
XII. Identity, Entitlement, and Access Management
XIII. Virtualization
XIV. Security as a Service

Certified Information Systems Auditor (CISA)

I. Module 1
                A.        Introduction
                B.        Audit Process
                C.        Auditing Standards
                D.        Auditing Guidelines
                E.        Cobit Model
                F.        Audit Management
                G.        Internal Control Classifications
                H.        Planning
                I.        Program
                J.        Evidence
                K.        Audit Control Evaluation
                L.        C S A Control Self- Assessment

II. Module 2
                A.        IT Governance
                B.        Outsourcing and Governance
                C.        IT Strategy
                D.        Governance and Security Policies
                E.        Organizational Compliance
                F.        Outsourcing and Globalization
                G.        Outsourcing
                H.        IT Performance

III. Module 3
                A.        System and Infrastructure
                B.        Requirements
                C.        Project Management Tools- Part 1
                D.        Project Management Tools- Part 2
                E.        Applications
                F.        Agile Development
                G.        Monitoring and Controlling
                H.        Acquisition Process
                I.        Testing Process
                J.        Information Systems Maintenance Practices
                K.        Data Conversion Tools

IV. Module 4
                A.        Media Disposal Process
                B.        Post Implementation Review
                C.        Periodic Review
                D.        System Maintenance

V. Module 5
                A.        IT Service Delivery and Support
                B.        How to Evaluate Service Level Management Practices
                C.        Operations Management
                D.        Databases
                E.        Structured Query Language
                F.        Monitoring Performance
                G.        Source Code and Performance Monitoring
                H.        Patch Management
                I.        Incident Management
                J.        Hardware Component Types
                K.        Network Component Types

VI. Module 6
                A.        S Auditor Technical Overview
                B.        Security Design
                C.        Monitoring Systems
                D.        Types of Attacks
                E.        Cryptography
                F.        Encryption
                G.        Asymmetric Encryption
                H.        Digital Certificate
                I.        Different Kinds of Attacks
                J.        Access Controls
                K.        Identification and Authentication
                L.        Physical Access Exposure
                M.        Environmental Security
                N.        Network Security Devices and Network Components
                O.        Network Address Translation
                P.        Virtual Private Networks
                Q.        Voice System Risks
                R.        Intrusion Detection
                S.        Firewalls
                T.        Firewall Implementation
                U.        Network Access Protection
                V.        Honey Pot
                W.        Risks to Portable and Wireless Devices
                X.        Bluetooth
                Y.        OSI Networking
                Z.        Managing Data

VII. Module 7
                A.        Business Continuity and Disaster Recovery
                B.        Fault Tolerance
                C.        Business Continuity and Disaster Recovery Regulations

Certified Information Security Manager (CISM)

I. Information Security Governance
II. Risk Management
III. Information Security Program Development
IV. Information Security Program Implementation
V. Information Security Program Management
VI. Incident Management and Response





Feather River Community College

570 Golden Eagle Avenue
Quincy, CA 95971-6023 US

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.