• CATALOG
  • FINANCIAL ASSISTANCE
  • MILITARY
  • LOGIN
University of New Mexico, Continuing Education Division
Home > Training Programs > Security > IT Security Survival Training (Vouchers Included)
CALL
NOW

855.520.6806

Fill out the form below

Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

IT Security Survival Training (Vouchers Included)

cyber-security-certification
$4,295.00 (USD)

OVERVIEW

DETAILS

OUTLINE

Security+
  1.     Networking Terminology
  2.     Locking Down or Network
  3.     Wireless
  4.     Intro to Security Terminology
  5.     Policies and Standards
  6.     Physical Security
  7.     Risk Analysis
  8.     Disaster Recovery, Business Continuity and BIA (Business Impact Analysis)
  9.     Introduction to Computer Forensics
  10.     Types of Attacks
  11.     System Security Threats
  12.     Security Assessments
  13.     Monitoring and Auditing
  14.     Authentication
  15.     Access Control
  16.     Mitigating Security Threats
  17.     Implementing System Security
  18.     Cryptography
  19.     Public Key Infrastructure
  20.     Live Labs

Cisco CCNA Security
  1.     Introduction
  2.     Network Security Basics I
  3.     Network Security Basics II
  4.     Securing Network Devices I
  5.     Securing Network Devices Lab I
  6.     IOS Enhancement Lab
  7.     Securing Network Devices II
  8.     Securing Network Devices Lab II
  9.     Using CCP to Configure SNMP Lab
  10.     Say Hello to AAA
  11.     Local AA
  12.     Configuring Local AAA with CCP
  13.     Firewall Basics Using ACLs
  14.     Intro Firewall
  15.     Content Based Access Control Firewall
  16.     Zoned Based Firewalls
  17.     Zoned Based Firewalls Lab
  18.     Configuring Advanced Firewall with CCP
  19.     Securing The LAN
  20.     Welcome to Cryto
  21.     VPN
  22.     Remote Access VPNS
  23.     VPN Lab
  24.     Managing A Secure Network
  25.     Outro
  26.     Live Labs

Certificate of Cloud Security Knowledge (CCSK)
  1. Architecture
  2. Governance and Enterprise Risk
  3. Legal Issues - Contracts and Electronic
  4. Compliance and Audit Management
  5. Information Management and Data Security
  6. Interoperability and Portability
  7. Traditional Security, Business Continuity, and Disaster Recovery
  8. Data Center Operations
  9. Incident Response
  10. Application Security
  11. Encryption and Key Management
  12. Identity, Entitlement, and Access Management
  13. Virtualization
  14. Security as a Service

Certified Information Systems Auditor (CISA)
  1. Module 1
                A.        Introduction
                B.        Audit Process
                C.        Auditing Standards
                D.        Auditing Guidelines
                E.        Cobit Model
                F.        Audit Management
                G.        Internal Control Classifications
                H.        Planning
                I.        Program
                J.        Evidence
                K.        Audit Control Evaluation
                L.        C S A Control Self- Assessment

  1. Module 2
                A.        IT Governance
                B.        Outsourcing and Governance
                C.        IT Strategy
                D.        Governance and Security Policies
                E.        Organizational Compliance
                F.        Outsourcing and Globalization
                G.        Outsourcing
                H.        IT Performance

  1. Module 3
                A.        System and Infrastructure
                B.        Requirements
                C.        Project Management Tools- Part 1
                D.        Project Management Tools- Part 2
                E.        Applications
                F.        Agile Development
                G.        Monitoring and Controlling
                H.        Acquisition Process
                I.        Testing Process
                J.        Information Systems Maintenance Practices
                K.        Data Conversion Tools

  1. Module 4
                A.        Media Disposal Process
                B.        Post Implementation Review
                C.        Periodic Review
                D.        System Maintenance

  1. Module 5
                A.        IT Service Delivery and Support
                B.        How to Evaluate Service Level Management Practices
                C.        Operations Management
                D.        Databases
                E.        Structured Query Language
                F.        Monitoring Performance
                G.        Source Code and Performance Monitoring
                H.        Patch Management
                I.        Incident Management
                J.        Hardware Component Types
                K.        Network Component Types

  1. Module 6
                A.        S Auditor Technical Overview
                B.        Security Design
                C.        Monitoring Systems
                D.        Types of Attacks
                E.        Cryptography
                F.        Encryption
                G.        Asymmetric Encryption
                H.        Digital Certificate
                I.        Different Kinds of Attacks
                J.        Access Controls
                K.        Identification and Authentication
                L.        Physical Access Exposure
                M.        Environmental Security
                N.        Network Security Devices and Network Components
                O.        Network Address Translation
                P.        Virtual Private Networks
                Q.        Voice System Risks
                R.        Intrusion Detection
                S.        Firewalls
                T.        Firewall Implementation
                U.        Network Access Protection
                V.        Honey Pot
                W.        Risks to Portable and Wireless Devices
                X.        Bluetooth
                Y.        OSI Networking
                Z.        Managing Data

  1. Module 7
                A.        Business Continuity and Disaster Recovery
                B.        Fault Tolerance
                C.        Business Continuity and Disaster Recovery Regulations

Certified Information Security Manager (CISM)
  1. Information Security Governance
  2. Risk Management
  3. Information Security Program Development
  4. Information Security Program Implementation
  5. Information Security Program Management
  6. Incident Management and Response

REQUIREMENTS

PREREQUISITES

INSTRUCTOR

FAQS

University of New Mexico, Continuing Education Division
Division of Continuing Education
1634 Univeristy Blvd. NE
Albuquerque, NM 87131 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.