ED-IT-110 Cybersecurity

×

Status message

Finding your location...
Category: 
IT - General
Combined Hours: 
180
Course Type: 
Mentor Supported
Bundled Courses:
Cybersecurity
  • Description
  • Objectives
  • Outline
  • Materials
  • Certification
  • System Requirements
  • Watch a Demo

This program teaches students the skills, knowledge and credentials required to successfully begin a career in the fields of Information Technology and Cybersecurity.

Cybersecurity

After completing this course, you should be able to:

  • Identify best practices, standards, and plans of action for information security
  • Discuss effective and appropriate ways to perform risk assessments and security management
  • Recall access control methods and security guidelines
  • Recall elements of the cybersecurity function needed for security requirements
  • Recognize techniques for auditing and monitoring cybersecurity controls

Cybersecurity

Cybersecurity Module 1
Best Practices and Standards

  • Value of Standards and Best Practices Documents
  • Standard of Good Practice for Information Security
  • ISO/IEC 27000 Suite of Information Security Standards
  • NIST Cybersecurity Framework and Security Documents
  • CIS Critical Security Controls
  • COBIT 5 for Information Security
  • Payment Card Industry Data Security Standard (PCI DSS)
  • ITU-T Security Documents
  • Effective Cybersecurity

Cybersecurity Module 2   
Planning for Cybersecurity

  • Security Governance and Security Management
  • Security Governance Principles and Desired Outcomes
  • Risk Assessment Concepts
  • Threat and Control Identification
  • Vulnerability Identification
  • Impact and Risk Assessment
  • Security Management Function
  • Security and Acceptable Use Policy

Cybersecurity Module 3   
Managing Cybersecurity Functions

  • Human Resource Security
  • People Management Best Practices
  • Information Classification and Handling
  • Privacy
  • Document and Records Management
  • Sensitive Physical Management
  • Information Management Best Practices
  • Hardware Life Cycle Management
  • Industrial Control Systems
  • Mobile Device Security

Cybersecurity Module 4
System Development and Access

  • System Development Life Cycle
  • System Development Management and Best Practices
  • Business Application Management Concepts
  • Corporate Business Application Security
  • End User-Developed Applications
  • System Access Controls
  • User Authentication
  • Password-Based Authentication
  • Possession-Based Authentication
  • Biometric Authentication
  • Access Control

Cybersecurity Module 5
System and Network Management

  • Server Configuration
  • Virtual Servers
  • Network Storage Systems
  • Backup
  • Change Management
  • Network Management Concepts
  • Virtual Private Networks and IP Security
  • Electronic Communications
  • Supply Chain Management
  • Cloud Security

Cybersecurity Module 6
Technical and Threat Management

  • Security Architecture
  • Malware Protection Software
  • Identity and Access Management
  • Digital Rights Management
  • Threat and Incident Management
  • Threat Intelligence
  • Cyber Attack Protection
  • Local Environment Security
  • Business Continuity Concepts

Cybersecurity Module 7
Security Assessment

  • Security Monitoring and Improvement
  • Security Audit
  • Security Performance
  • Security Monitoring Best Practices
  • Security Improvement Best Practices

 

All course materials included.

Cybersecurity

Internet Connection

  • Broadband or High-Speed - DSL, Cable, and Wireless Connections

*Dial-Up internet connections will result in a diminished online experience. Classroom pages may load slowly and viewing large audio and video files may not be possible.

 

Hardware Requirements

  • Processor - 2GHz Processor or Higher
  • Memory - 1 GB RAM Minimum Recommended

While our courses are accessible through multiple mobile learning platforms, some courses may include a CD or DVD with the Textbook, so you may need access to a computer with CD-ROM or DVD Drive.

 

PC Software Requirements

  • Operating Systems - Windows 7 or higher
  • Microsoft Office 2007 or higher. Also, you could use a general Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • Kindle Reader App is needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • QuickTime, Windows Media Player &/or Real Player

 

MAC Software Requirements

  • Operating Systems - Mac OS x 10 or higher with Windows
  • Mac office programs or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
  • Internet Browsers- Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
  • Kindle Reader App is needed for many of our courses (No special equipment needed. This can be downloaded for FREE onto your computer.)
  • PowerPoint Viewer (if you do not have PowerPoint)
  • Adobe PDF Reader
  • Apple QuickTime Media Player
  • Courses that include a CD-ROM or DVD may require an external drive and Parallels software to view.


Click on the school name below for purchasing info:

1101 W. Liberty St.
Medina, OH 44256
United States
Phone: 727-824-7800 ext 8

This course is also available at the following school:

Online School Finder
(Virtual Location)


To perform a search for schools based on a custom location please click here.