Course Code: GES367
Understand security governance, policies, confidentiality, how to handle classified information, handling requirements, ownership, and privacy.
Discuss security models, security designs, engineering processes, vulnerabilities, cryptography, and embedded devices.
Learn about network architecture design, network components, communication channels, and network attacks.
Cover physical and logical assets control, identification and authentication, identity as a service, provisioning lifecycle, and more.
Master assessment and test strategies, test outputs, security testing, security process data, and security architectures.
Complete the course by learning about foundational security operations, management processes, handling resources, and software security best practices.
I. Security and Risk Management
A. Security Governance
B. Security Policies
D. Business Continuity
E. Legal and Regulatory
F. Professional Ethic
G. Risk Management
II. Asset Security
A. Information Classification
B. Handling Requirements
D. Data Security Controls
E. Protect Privacy
III. Security Engineering
A. Security Models
B. Security Designs
C. Engineering Processes
F. Embedded Devices
G. Site Design and Security
IV. Communication and Network Security
A. Network Architecture Design
B. Network Components
C. Communication Channels
D. Network Attacks
V. Identity and Access Management
A. Physical and Logical Assets Control
B. Identification and Authentication
C. Third-Party Identity Services
D. Identity as a Service
E. Provisioning Lifecycle
F. Authorization Mechanisms
VI. Security Assessment and Testing
A. Assessment and Test Strategies
B. Test Outputs
C. Security Control Testing
D. Security Process Data
E. Security Architectures
VII. Security Operations
A. Foundational Security Operations Concepts
B. Logging, Monitoring and Investigating Activities
C. Provisioning of Resources
D. Management Processes
E. Physical Security
F. Preventative Measures
G. Business Continuity
VIII. Software Development Security
A. Security in the Software Development Lifecycle
B. Development Environment Security Controls
C. Software Security Effectiveness
D. Software Security Impact
David Grimes brings over 10 years experience in IT, education, instruction, curriculum design, combined with extensive management and leadership experience in the private and non-profit sectors. His passion for technology and education has led David to work as an academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist and blogger. David holds a Master of Education and a Bachelor of Science, both in Technology Education, from Ohio State University in Columbus, Ohio. In addition, he has earned IT industry certifications and has been published in a book on gamification in the classroom.
This is an advanced level program. Students should have a base knowledge or certification in SSCP. If students wish to take the course without the foundational topics of SSCP, the student is expected to supplement course materials with outside resources.
For certification through (ISC)2, an individual must have a minimum of five-years of paid, full-time work experience in two of the eight domains of CISSP. A one-year experience waiver can be used in place of a four-year college degree or equivalent through an (ISC)2 approved list.
Once a person passes the (ISC)2 vendor exam, an endorsement is also required. This endorsement form must be signed by two (ISC)2 professional who are active members and can verify your professional experience.
Instructional material requirements:
(ISC)2 is an international association committed to ensuring the growth and learning of information security professionals. There is much at stake in this fast-paced industry, and it’s important to stay up-to-date on all the latest tools and techniques. (ISC)2 is committed to putting you at the forefront of the industry, and as the world’s leading organization dedicated to promoting IT and cybersecurity, they have the resources to do just that. When you enroll in a course certified by (ISC)2, you can be confident you’re getting the latest information and the most robust and renowned certifications in the industry.
Yes, ed2go courses are online, so you never have to actually travel to the school. Most schools offer telephone or online registration.
This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.
The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.
ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance
Upon successful completion of the course, you will be awarded a Certificate of Completion.
This course will provide you with the skills you need to obtain an entry-level position in most cases. We do not offer direct job placement services, but our instructors and career counselors will help you build your resume and advise you on starting your career. Instructors can also be used as a professional reference upon course completion. However, you should always research the job market in your area before registering.
You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructor are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.
If you have questions that are not answered on our website, please feel free to contact us via LIVE CHAT or by calling us at (855) 520-6806. If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form.
This course is open enrollment, so you can register and start the course as soon as you are ready. Please note: Once the course curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued. Access to your course can take 24-48 business hours.
Yes, this program helps prepare student for the CISSP® - Certified Information Security Professional certification, which is provided through (ISC)2.
Please note: Individuals wishing to take the CISSP exam are required to have a minimum of 5 years of paid full-time work experience in 2 of the 8 domains of the CISSP CBK, which covers critical topics in security today including risk management, cloud computing, mobile security, application development security, and others. Information about the CISSP credential and exam is available on their website: https://www.isc2.org/cissp/default.aspx.