• CATALOG
  • FINANCIAL ASSISTANCE
  • MILITARY
  • LOGIN
University of New Mexico, Continuing Education Division
Home > Training Programs > Security > Information Security Master Certification Training
CALL
NOW

855.520.6806

Fill out the form below

Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

Information Security Master Certification Training

security-certificate
$2,495.00 (USD)

OVERVIEW

DETAILS

OUTLINE

Cisco CCNA Security
  1.     Introduction
  2.     Network Security Basics I
  3.     Network Security Basics II
  4.     Securing Network Devices I
  5.     Securing Network Devices Lab I
  6.     IOS Enhancement Lab
  7.     Securing Network Devices II
  8.     Securing Network Devices Lab II
  9.     Using CCP to Configure SNMP Lab
  10.     Say Hello to AAA
  11.     Local AAA
  12.     Configuring Local AAA with CCP
  13.     Firewall Basics Using ACLs
  14.     Intro Firewall
  15.     Content Based Access Control Firewall
  16.     Zoned Based Firewalls
  17.     Zoned Based Firewalls Lab
  18.     Configuring Advanced Firewall with CCP
  19.     Securing The LAN
  20.     Welcome to Cryto
  21.     VPN
  22.     Remote Access VPNS
  23.     VPN Lab
  24.     Managing A Secure Network
  25.     Outro
  26.     Live Labs

CompTIA Advanced Security Practitioner (CASP)
  1.     Underlying Security Models
  2.     Selecting Security
  3.     Cryptography
  4.     Storage
  5.     Virtual Computing
  6.     Module 6: IPv6
  7.     Remote Access Security
  8.     Domain Name System
  9.     Directory Services
  10.     Firewall and VPN
  11.     Security Configuration Management
  12.     Network Infrastructure Security
  13.     Secure Web Services
  14.     Buffer Overflows
  15.     SQL Injection
  16.     Access Control
  17.     Single Sign-On
  18.     Risk Assessment
  19.     Testing and Assessment
  20.     Common Vulnerability
  21.     Common Criteria
  22.     Personally Identifiable Information
  23.     Risk Management
  24.     Frameworks
  25.     Interconnecting Systems
  26.     Security Services
  27.     Continuous Monitoring
  28.     Incident Handling
  29.     Forensic & Incident Response
  30.     Requirements Processing
  31.     Standards Bodies
  32.     Secure System Life Cycle
  33.     Email
  34.     Mobile and BYOD
  35.     Voiceover IP
  36.     Physical Facilities Assessment Process
  37.     Security Requirements Traceability Matrix
  38.     Live Labs

Certificate of Cloud Security Knowledge (CCSK)
  1.     Architecture
  2.     Governance and Enterprise Risk
  3.     Legal Issues - Contracts and Electronic
  4.     Compliance and Audit Management
  5.     Information Management and Data Security
  6.     Interoperability and Portability
  7.     Traditional Security, Business Continuity, and Disaster Recovery
  8.     Data Center Operations
  9.     Incident Response
  10.     Application Security
  11.     Encryption and Key Management
  12.     Identity, Entitlement, and Access Management
  13.     Virtualization
  14.     Security as a Service

Certified Information Systems Auditor (CISA)
  1. Module 1
                A.    Introduction
                B.    Audit Process
                C.    Auditing Standards
                D.    Auditing Guidelines
                E.    Cobit Model
                F.    Audit Management
                G.    Internal Control Classifications
                H.    Planning
                I.    Program
                J.    Evidence
                K.    Audit Control Evaluation
                L.    C S A Control Self- Assessment
  1.  Module 2
                A.    IT Governance
                B.    Outsourcing and Governance
                C.    IT Strategy
                D.    Governance and Security Policies
                E.    Organizational Compliance
                F.    Outsourcing and Globalization
                G.    Outsourcing
                H.    IT Performance
  1.  Module 3
                A.    System and Infrastructure
                B.    Requirements
                C.    Project Management Tools- Part 1
                D.    Project Management Tools- Part 2
                E.    Applications
                F.    Agile Development
                G.    Monitoring and Controlling
                H.    Acquisition Process
                I.    Testing Process
                J.    Information Systems Maintenance Practices
                K.    Data Conversion Tools
  1. Module 4
                A.    Media Disposal Process
                B.    Post Implementation Review
                C.    Periodic Review
                D.    System Maintenance
  1. Module 5
                A.    IT Service Delivery and Support
                B.    How to Evaluate Service Level Management Practices
                C.    Operations Management
                D.    Databases
                E.    Structured Query Language
                F.    Monitoring Performance
                G.    Source Code and Performance Monitoring
                H.    Patch Management
                I.    Incident Management
                J.    Hardware Component Types
                K.    Network Component Types
  1. Module 6
                A.    I S Auditor Technical Overview
                B.    Security Design
                C.    Monitoring Systems
                D.    Types of Attacks
                E.    Cryptography
                F.    Encryption
                G.    Asymmetric Encryption
                H.    Digital Certificate
                I.    Different Kinds of Attacks
                J.    Access Controls
                K.    Identification and Authentication
                L.    Physical Access Exposure
                M.    Environmental Security
                N.    Network Security Devices and Network Components
                O.    Network Address Translation
                P.    Virtual Private Networks
                Q.    Voice System Risks
                R.    Intrusion Detection
                S.    Firewalls
                T.    Firewall Implementation
                U.    Network Access Protection
                V.    Honey Pot
                W.    Risks to Portable and Wireless Devices
                X.    Bluetooth
                Y.    OSI Networking
                Z.    Managing Data
  1. Module 7
                A.    Business Continuity and Disaster Recovery
                B.    Fault Tolerance
                C.    Business Continuity and Disaster Recovery Regulations

PMI Risk Management Professional

  1.     Introduction
  2.     Risk Management Concepts
  3.      Risk Management Environment
  4.     Project Definition
  5.     Risk Management Planning
  6.     Risk Identification
  7.     Qualitative Risk Analysis
  8.     Quantitative Risk Analysis
  9.     Risk Response Planning
  10.     Risk Monitoring and Controlling
  11.     Certified Information Security Manager (CISM)
  12.     Information Security Governance
  13.     Risk Management
  14.     Information Security Program Development
  15.     Information Security Program Implementation
  16.     Information Security Program Management
  17.     Incident Management and Response
Certified Information Systems Security Professional (CISSP)
  1.     Security and Risk Management
  2.     Asset Security
  3.     Security Engineering
  4.     Communication and Network Security
  5.     Identity and Access Management
  6.     Security Assessment Testing
  7.     Security Operations
  8.     Software Development Security

REQUIREMENTS

PREREQUISITES

INSTRUCTOR

FAQS

University of New Mexico, Continuing Education Division
Division of Continuing Education
1634 Univeristy Blvd. NE
Albuquerque, NM 87131 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.