Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications Autodesk Microsoft QuickBooks Windows Computer Programming Computer Programming Programming Classes Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map How It Works How It Works About ed2go Externship Programs Financial Assistance Corporate Training Find a School Student Blog Military

CONTACT US

(855) 520-6806

See all results for ""

See All Courses

ed2go Information Technology Security Information Security Master Certification Training
Return to Security
it-security-certifications

Information Security Master Certification Training

In today’s world, security of information is a constant concern of any business or organization. With techniques changing every day, it’s paramount that companies protect themselves by having high-level security experts on staff. One small oversight can cost millions, so companies are willing to pay the high salaries demanded by these types of IT professionals. With our Information Security Master Certification course, you will become an expert in all areas of IT security, knowledge that is highly desired in the marketplace.

This course provides seven different training courses covering the entire spectrum of IT security certifications. Whether you’re looking to get ahead at your current organization or want to start your new career off on the right foot, this course will prepare you for any type of position within the IT security sector. Our robust course covers all areas of security, including technical security, risk assessment, cloud security, and policy management.

By the end of this course, you will not only understand the technical aspects of IT security, but also how to manage and write policy to govern security practices. There are many paths to information security certifications, and this training will ensure you are marketable and prepared for any of the positions available in the marketplace. IT security has never been stronger, and the market for professionals with these credentials is highly lucrative. This course offers enrollment with or without a voucher. The voucher is pre paid access to sit for the certifying exam upon eligibility.

12 Months / 330 Course Hrs
Open enrollment

Offered in Partnership with your Preferred School

George Mason University

Why this school? It's been chosen based on your location or if you've visited this school's website. Change School

Bundle and Save

Include Voucher: Access to certification exam

Self-paced. Study at your own schedule

No Voucher

Self-paced. Study at your own schedule

Contact Us for additional information

Information Security Master Certification Training

Contact Us

Details + Objectives

Course Code: GES360

What You Will Learn
  • Learn about technical security, risk assessment, cloud security, and policy management
  • Manage and write policy to govern security practices
  • Login via virtual machines to live infrastructure and practice on live environments
  • Understand best practices for modern day IT security technology
How the course is taught
  • Self-paced, online course
  • 12 months to complete
  • Open enrollment, begin anytime
  • 330 course hours
How you will benefit
  • Use Live Labs to develop your practical IT skills in a safe working environment without the need to invest in your own hardware and software
  • Know that the registration fees for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, and Certified Information Systems Security Professional (CISSP) certification exams are included with this course
  • Become knowledgeable in all areas of IT security and prepare yourself for a lucrative position in the field

Outline

Expand All
Cisco CCNA Security

Begin the course by learning about network security basics, how to secure network devices, IOS enhancement labs, local AAA, firewall basics, LAN, VPN, and more.

CompTIA Advanced Security Practitioner

Cover underlying security models, cryptography, storage, virtual computing, remote access security, domain name systems, directory services, network infrastructure security, web services, buffer overflows, risk assessment and management, and more.

Certificate of Cloud Security Knowledge

Explore architecture, governance and enterprise risk, legal issues, compliance and audit management, information management and data security, interoperability and portability, data center operations, incident response, application security, and virtualization.

Certified Information Systems Auditor

Understand the audit process, IT governance, IT strategy, systems and infrastructure, query language, hardware component types, and more.

PMI Risk Management Professional

Dive into risk management concepts and environments, risk management planning, risk identification, risk analysis, risk monitoring and controlling, information security, and more.

Certified Information Systems Security Professional

Complete the course by learning about security and risk management, asset security, security engineering, communication and network security, identity and access management, security assessment testing, security operations, and software development security.

Details

Cisco CCNA Security

  1.     Introduction
  2.     Network Security Basics I
  3.     Network Security Basics II
  4.     Securing Network Devices I
  5.     Securing Network Devices Lab I
  6.     IOS Enhancement Lab
  7.     Securing Network Devices II
  8.     Securing Network Devices Lab II
  9.     Using CCP to Configure SNMP Lab
  10.     Say Hello to AAA
  11.     Local AAA
  12.     Configuring Local AAA with CCP
  13.     Firewall Basics Using ACLs
  14.     Intro Firewall
  15.     Content Based Access Control Firewall
  16.     Zoned Based Firewalls
  17.     Zoned Based Firewalls Lab
  18.     Configuring Advanced Firewall with CCP
  19.     Securing The LAN
  20.     Welcome to Crypto
  21.     VPN
  22.     Remote Access VPNS
  23.     VPN Lab
  24.     Managing A Secure Network
  25.     Outro
  26.     Live Labs


CompTIA Advanced Security Practitioner (CASP)

  1.     Underlying Security Models
  2.     Selecting Security
  3.     Cryptography
  4.     Storage
  5.     Virtual Computing
  6.     Module 6: IPv6
  7.     Remote Access Security
  8.     Domain Name System
  9.     Directory Services
  10.     Firewall and VPN
  11.     Security Configuration Management
  12.     Network Infrastructure Security
  13.     Secure Web Services
  14.     Buffer Overflows
  15.     SQL Injection
  16.     Access Control
  17.     Single Sign-On
  18.     Risk Assessment
  19.     Testing and Assessment
  20.     Common Vulnerability
  21.     Common Criteria
  22.     Personally Identifiable Information
  23.     Risk Management
  24.     Frameworks
  25.     Interconnecting Systems
  26.     Security Services
  27.     Continuous Monitoring
  28.     Incident Handling
  29.     Forensic & Incident Response
  30.     Requirements Processing
  31.     Standards Bodies
  32.     Secure System Life Cycle
  33.     Email
  34.     Mobile and BYOD
  35.     Voiceover IP
  36.     Physical Facilities Assessment Process
  37.     Security Requirements Traceability Matrix
  38.     Live Labs


Certificate of Cloud Security Knowledge (CCSK)

  1.     Architecture
  2.     Governance and Enterprise Risk
  3.     Legal Issues - Contracts and Electronic
  4.     Compliance and Audit Management
  5.     Information Management and Data Security
  6.     Interoperability and Portability
  7.     Traditional Security, Business Continuity, and Disaster Recovery
  8.     Data Center Operations
  9.     Incident Response
  10.     Application Security
  11.     Encryption and Key Management
  12.     Identity, Entitlement, and Access Management
  13.     Virtualization
  14.     Security as a Service


Certified Information Systems Auditor (CISA)

  1. Module 1

                A.    Introduction
                B.    Audit Process
                C.    Auditing Standards
                D.    Auditing Guidelines
                E.    Cobit Model
                F.    Audit Management
                G.    Internal Control Classifications
                H.    Planning
                I.    Program
                J.    Evidence
                K.    Audit Control Evaluation
                L.    C S A Control Self- Assessment

 

 

  1.  Module 2

                A.    IT Governance
                B.    Outsourcing and Governance
                C.    IT Strategy
                D.    Governance and Security Policies
                E.    Organizational Compliance
                F.    Outsourcing and Globalization
                G.    Outsourcing
                H.    IT Performance

 

 

  1.  Module 3

                A.    System and Infrastructure
                B.    Requirements
                C.    Project Management Tools- Part 1
                D.    Project Management Tools- Part 2
                E.    Applications
                F.    Agile Development
                G.    Monitoring and Controlling
                H.    Acquisition Process
                I.    Testing Process
                J.    Information Systems Maintenance Practices
                K.    Data Conversion Tools

 

 

  1. Module 4

                A.    Media Disposal Process
                B.    Post Implementation Review
                C.    Periodic Review
                D.    System Maintenance

 

 

  1. Module 5

                A.    IT Service Delivery and Support
                B.    How to Evaluate Service Level Management Practices
                C.    Operations Management
                D.    Databases
                E.    Structured Query Language
                F.    Monitoring Performance
                G.    Source Code and Performance Monitoring
                H.    Patch Management
                I.    Incident Management
                J.    Hardware Component Types
                K.    Network Component Types

 

 

  1. Module 6

                A.    I S Auditor Technical Overview
                B.    Security Design
                C.    Monitoring Systems
                D.    Types of Attacks
                E.    Cryptography
                F.    Encryption
                G.    Asymmetric Encryption
                H.    Digital Certificate
                I.    Different Kinds of Attacks
                J.    Access Controls
                K.    Identification and Authentication
                L.    Physical Access Exposure
                M.    Environmental Security
                N.    Network Security Devices and Network Components
                O.    Network Address Translation
                P.    Virtual Private Networks
                Q.    Voice System Risks
                R.    Intrusion Detection
                S.    Firewalls
                T.    Firewall Implementation
                U.    Network Access Protection
                V.    Honey Pot
                W.    Risks to Portable and Wireless Devices
                X.    Bluetooth
                Y.    OSI Networking
                Z.    Managing Data

 

 

  1. Module 7

                A.    Business Continuity and Disaster Recovery
                B.    Fault Tolerance
                C.    Business Continuity and Disaster Recovery Regulations

PMI Risk Management Professional

  1.     Introduction
  2.     Risk Management Concepts
  3.      Risk Management Environment
  4.     Project Definition
  5.     Risk Management Planning
  6.     Risk Identification
  7.     Qualitative Risk Analysis
  8.     Quantitative Risk Analysis
  9.     Risk Response Planning
  10.     Risk Monitoring and Controlling
  11.     Certified Information Security Manager (CISM)
  12.     Information Security Governance
  13.     Risk Management
  14.     Information Security Program Development
  15.     Information Security Program Implementation
  16.     Information Security Program Management
  17.     Incident Management and Response

 

Certified Information Systems Security Professional (CISSP)

  1.     Security and Risk Management
  2.     Asset Security
  3.     Security Engineering
  4.     Communication and Network Security
  5.     Identity and Access Management
  6.     Security Assessment Testing
  7.     Security Operations
  8.     Software Development Security

 

View All Sections

Instructors & Support

Chris Avants

Chris Avants is a Sr. Cisco Instructor and leading consultant for numerous clients. He has over 15 years of experience as a network engineer, having worked with national and global clients to solve complex business problems through the use of technology and IT training solutions. For more than a decade, Avants was as a Sr. Network Engineer, designing and deploying advanced technology solutions from Cisco Systems, Microsoft, VMARE and more.

Dean R. Bushmiller

Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins. Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.

Chrys Thorsen

Chrys Thorsen is an experienced IT instructor with over 30 years of experience in IT. Thorsen is the founder and owner of IT without Borders, a company specializing in high-end IT consulting. Over the past 10 years, Thorsen has focused on IT certification instruction, quickly becoming a recognized industry leader in a variety of certifications.

Belinda Fremouw

Belinda Fremouw has over twenty years of business experience in project and portfolio management.

Joe Wentzel

Joe Wentzel is a master technical instructor, with a background in oil and gas exploration, seismic, financial, and IT. He is a subject matter expert in the IT security industry and has more than 20 certifications. Prior to becoming an instructor, Wentzel provided customer technical support in cabled and wireless seismic acquisition systems. He has authored numerous papers on system security and security engineering.

David Biggers

David Biggers, Senior Security Instructor, has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Network Administration, System Administration, Blackboard Administration, Web Design and Web Development. Additionally, David taught part time during the evening at the college, where he instructed on Active Directory, Introduction to Computers and Networking. David has 18 years of IT experience, 17 professional IT certifications and 8 years of teaching experience. 

Show all Instructors & Support
Requirements

Prerequisites / Requirements

Prerequisites:

Students should have strong understanding of IT networking & security.

Requirements:

Hardware Requirements: 

  • This course can be taken on either a PC or Mac device.

Software Requirements: 

  • PC: Windows XP or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Flash Player. Click here to download the Flash Player.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Email capabilities and access to a personal email account.
  • Software must be installed and fully operational before the course begins.
Instructional Materials

The instructional materials required for this course are included in enrollment and will be available online.

More About

The registration fees for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, and Certified Information Systems Security Professional (CISSP) certification exams are included with this course.

About Certification

cisco

If you’re an information technology professional, you’ve probably heard of Cisco. They’re one of the top companies in the industry, helping people to connect and communicate through network systems and more. They are a major provider of voiceover IP products, networking hardware, and cloud-based services, as well as many certification opportunities. These include five levels of expertise and nine different topics, such as Routing & Switching and Network Security. Cisco is the largest networking company in the world, and its prestigious status lends its certifications special credibility. When you enroll in a course certified by Cisco, you’ll know you’re getting the best—and so will your employers.

FAQs

Expand All
Can I register for a course if I am an international student?

Yes, ed2go courses are online, so you never have to actually travel to the school. Most schools offer telephone or online registration.

Does this course prepare for a certification?

Yes, you will be prepared for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, Certified Information Systems Security Professional (CISSP) certification exams and you will receive exam vouchers for each exam after successful completion and financial obligation.

When can I start the course?

This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.

How long does it take to complete this course?

This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive twelve (12) months to complete the course.

What if I don't have enough time to complete my course within the time frame provided?

The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.

What kind of support will I receive?

You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.

What happens when I complete the course?

Upon successful completion of the course, you will be awarded a certificate of completion. In addition, you will receive exam vouchers for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, and Certified Information Systems Security Professional (CISSP) after successful completion of the course and financial obligation. 

Am I guaranteed a job?

This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.

Can I get financial assistance?

ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance

How can I get more information about this course?

If you have questions that are not answered on our website, please feel free to contact us via LIVE CHAT or by calling us at (855) 520-6806. If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form.

Browse All