Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications AutoCAD Microsoft QuickBooks Windows Computer Programming Computer Programming Programming Classes Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map How It Works How It Works About ed2go Externship Programs Financial Assistance Corporate Training Find a School Military Virtual Career Center


(855) 520-6806

See all results for ""

See All Courses

ed2go Information Technology Security Information Security Master Certification Training
Return to Security

Information Security Master Certification Training (Vouchers Included)

In today’s world, security of information is a constant concern of any business or organization. With techniques changing every day, it’s paramount that companies protect themselves by having high-level security experts on staff. One small oversight can cost millions, so companies are willing to pay the high salaries demanded by these types of IT professionals. With our Information Security Master Certification program, you will become an expert in all areas of IT security, knowledge that is highly desired in the marketplace.

This program provides seven different training courses covering the entire spectrum of IT security certifications. Whether you’re looking to get ahead at your current organization or want to start your new career off on the right foot, this program will prepare you for any type of position within the IT security sector. Our robust program covers all areas of security, including technical security, risk assessment, cloud security, and policy management.

By the end of this course, you will not only understand the technical aspects of IT security, but also how to manage and write policy to govern security practices. There are many paths to information security certifications, and this training will ensure you are marketable and prepared for any of the positions available in the marketplace. IT security has never been stronger, and the market for professionals with these credentials is highly lucrative. 


12 Months / 330 Course Hrs
Open Enrollment

Offered in Partnership with your Preferred School

George Mason University Why this school? It's been chosen based on your location or if you've visited this school's website.

Financial Assistance Available*

Change School

Bundle and Save

Contact Us

Information Security Master Certification Training (Vouchers Included)

Bundle and Save

Contact Us

Information Security Master Certification Training (Vouchers Included) Details + Objective

Course Code: GES360

You Will Learn
  • Learn about technical security, risk assessment, cloud security, and policy management
  • Manage and write policy to govern security practices
  • Login via virtual machines to live infrastructure and practice on live environments
  • Understand best practices for modern day IT security technology
How the course is taught
  • Self-paced, online course
  • 12 months to complete
  • Open enrollment, begin anytime
  • 330 course hours
How you will benefit
  • Use Live Labs to develop your practical IT skills in a safe working environment without the need to invest in your own hardware and software
  • Know that the registration fees for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, and Certified Information Systems Security Professional (CISSP) certification exams are included with this program
  • Become knowledgeable in all areas of IT security and prepare yourself for a lucrative position in the field
Information Security Master Certification Training (Vouchers Included) Outline
Expand All
Cisco CCNA Security

Begin the course by learning about network security basics, how to secure network devices, IOS enhancement labs, local AAA, firewall basics, LAN, VPN, and more.

CompTIA Advanced Security Practitioner

Cover underlying security models, cryptography, storage, virtual computing, remote access security, domain name systems, directory services, network infrastructure security, web services, buffer overflows, risk assessment and management, and more.

Certificate of Cloud Security Knowledge

Explore architecture, governance and enterprise risk, legal issues, compliance and audit management, information management and data security, interoperability and portability, data center operations, incident response, application security, and virtualization.

Certified Information Systems Auditor

Understand the audit process, IT governance, IT strategy, systems and infrastructure, query language, hardware component types, and more.

PMI Risk Management Professional

Dive into risk management concepts and environments, risk management planning, risk identification, risk analysis, risk monitoring and controlling, information security, and more.

Certified Information Systems Security Professional

Complete the course by learning about security and risk management, asset security, security engineering, communication and network security, identity and access management, security assessment testing, security operations, and software development security.

Program Details

Cisco CCNA Security

  1.     Introduction
  2.     Network Security Basics I
  3.     Network Security Basics II
  4.     Securing Network Devices I
  5.     Securing Network Devices Lab I
  6.     IOS Enhancement Lab
  7.     Securing Network Devices II
  8.     Securing Network Devices Lab II
  9.     Using CCP to Configure SNMP Lab
  10.     Say Hello to AAA
  11.     Local AAA
  12.     Configuring Local AAA with CCP
  13.     Firewall Basics Using ACLs
  14.     Intro Firewall
  15.     Content Based Access Control Firewall
  16.     Zoned Based Firewalls
  17.     Zoned Based Firewalls Lab
  18.     Configuring Advanced Firewall with CCP
  19.     Securing The LAN
  20.     Welcome to Cryto
  21.     VPN
  22.     Remote Access VPNS
  23.     VPN Lab
  24.     Managing A Secure Network
  25.     Outro
  26.     Live Labs

CompTIA Advanced Security Practitioner (CASP)

  1.     Underlying Security Models
  2.     Selecting Security
  3.     Cryptography
  4.     Storage
  5.     Virtual Computing
  6.     Module 6: IPv6
  7.     Remote Access Security
  8.     Domain Name System
  9.     Directory Services
  10.     Firewall and VPN
  11.     Security Configuration Management
  12.     Network Infrastructure Security
  13.     Secure Web Services
  14.     Buffer Overflows
  15.     SQL Injection
  16.     Access Control
  17.     Single Sign-On
  18.     Risk Assessment
  19.     Testing and Assessment
  20.     Common Vulnerability
  21.     Common Criteria
  22.     Personally Identifiable Information
  23.     Risk Management
  24.     Frameworks
  25.     Interconnecting Systems
  26.     Security Services
  27.     Continuous Monitoring
  28.     Incident Handling
  29.     Forensic & Incident Response
  30.     Requirements Processing
  31.     Standards Bodies
  32.     Secure System Life Cycle
  33.     Email
  34.     Mobile and BYOD
  35.     Voiceover IP
  36.     Physical Facilities Assessment Process
  37.     Security Requirements Traceability Matrix
  38.     Live Labs

Certificate of Cloud Security Knowledge (CCSK)

  1.     Architecture
  2.     Governance and Enterprise Risk
  3.     Legal Issues - Contracts and Electronic
  4.     Compliance and Audit Management
  5.     Information Management and Data Security
  6.     Interoperability and Portability
  7.     Traditional Security, Business Continuity, and Disaster Recovery
  8.     Data Center Operations
  9.     Incident Response
  10.     Application Security
  11.     Encryption and Key Management
  12.     Identity, Entitlement, and Access Management
  13.     Virtualization
  14.     Security as a Service

Certified Information Systems Auditor (CISA)

  1. Module 1

                A.    Introduction
                B.    Audit Process
                C.    Auditing Standards
                D.    Auditing Guidelines
                E.    Cobit Model
                F.    Audit Management
                G.    Internal Control Classifications
                H.    Planning
                I.    Program
                J.    Evidence
                K.    Audit Control Evaluation
                L.    C S A Control Self- Assessment



  1.  Module 2

                A.    IT Governance
                B.    Outsourcing and Governance
                C.    IT Strategy
                D.    Governance and Security Policies
                E.    Organizational Compliance
                F.    Outsourcing and Globalization
                G.    Outsourcing
                H.    IT Performance



  1.  Module 3

                A.    System and Infrastructure
                B.    Requirements
                C.    Project Management Tools- Part 1
                D.    Project Management Tools- Part 2
                E.    Applications
                F.    Agile Development
                G.    Monitoring and Controlling
                H.    Acquisition Process
                I.    Testing Process
                J.    Information Systems Maintenance Practices
                K.    Data Conversion Tools



  1. Module 4

                A.    Media Disposal Process
                B.    Post Implementation Review
                C.    Periodic Review
                D.    System Maintenance



  1. Module 5

                A.    IT Service Delivery and Support
                B.    How to Evaluate Service Level Management Practices
                C.    Operations Management
                D.    Databases
                E.    Structured Query Language
                F.    Monitoring Performance
                G.    Source Code and Performance Monitoring
                H.    Patch Management
                I.    Incident Management
                J.    Hardware Component Types
                K.    Network Component Types



  1. Module 6

                A.    I S Auditor Technical Overview
                B.    Security Design
                C.    Monitoring Systems
                D.    Types of Attacks
                E.    Cryptography
                F.    Encryption
                G.    Asymmetric Encryption
                H.    Digital Certificate
                I.    Different Kinds of Attacks
                J.    Access Controls
                K.    Identification and Authentication
                L.    Physical Access Exposure
                M.    Environmental Security
                N.    Network Security Devices and Network Components
                O.    Network Address Translation
                P.    Virtual Private Networks
                Q.    Voice System Risks
                R.    Intrusion Detection
                S.    Firewalls
                T.    Firewall Implementation
                U.    Network Access Protection
                V.    Honey Pot
                W.    Risks to Portable and Wireless Devices
                X.    Bluetooth
                Y.    OSI Networking
                Z.    Managing Data



  1. Module 7

                A.    Business Continuity and Disaster Recovery
                B.    Fault Tolerance
                C.    Business Continuity and Disaster Recovery Regulations

PMI Risk Management Professional

  1.     Introduction
  2.     Risk Management Concepts
  3.      Risk Management Environment
  4.     Project Definition
  5.     Risk Management Planning
  6.     Risk Identification
  7.     Qualitative Risk Analysis
  8.     Quantitative Risk Analysis
  9.     Risk Response Planning
  10.     Risk Monitoring and Controlling
  11.     Certified Information Security Manager (CISM)
  12.     Information Security Governance
  13.     Risk Management
  14.     Information Security Program Development
  15.     Information Security Program Implementation
  16.     Information Security Program Management
  17.     Incident Management and Response


Certified Information Systems Security Professional (CISSP)

  1.     Security and Risk Management
  2.     Asset Security
  3.     Security Engineering
  4.     Communication and Network Security
  5.     Identity and Access Management
  6.     Security Assessment Testing
  7.     Security Operations
  8.     Software Development Security


View All Sections
Information Security Master Certification Training (Vouchers Included) Instructors
Chris Avants

Chris Avants is a Sr. Cisco Instructor and leading consultant for clients throughout the U.S. Chris has over 15 years’ experience as a network engineer and 5 additional years as an instructor. Chris has worked at the service provider/partner level throughout his career, working with national and global clients to solve complex business problems through the use of technology and IT training solutions. Working with Chris, you will see a true industry expert with experience, drive, and patience unparalleled in the industry. Chris began his career with GE Capital IT Solutions at the age of 17. He quickly gained multiple professional-level certifications from Cisco and Microsoft. Chris spent the next decade as a Sr. Network Engineer designing and deploying advanced technology solutions from Cisco Systems, Microsoft, VMARE and more. Originally hired for his unique skillset and experience with APPLE Networking, Chris spent his free time learning new networking technologies and concepts. The time invested quickly paid-off as he earned a coveted Microsoft Certified Systems Engineer certification at the age of 17. He joined an engineering team where he would gain his first hands-on experience with Microsoft Windows & Exchange Server, in addition to Cisco Routers and Switches. By age 18, Chris earned his CCNA and was a leading implementation engineer for GE Capital’s K-12 and Enterprise customer base throughout Texas for the next several years.

Dean R. Bushmiller

Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins. Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.

Chrys Thorsen

Chrys Thorsen is an experienced IT instructor with over 30 years’ experience in IT. Chrys has over 35 certifications including Cisco CCNP/CCSI, Microsoft MCITP/MCSE/MCT, CISSP and CISA. Chrys is the founder and owner of IT without Borders, a company specializing in high end IT consulting. Over the past 10 years, Chrys has focused on IT certification instruction, quickly becoming a recognized industry leader in a variety of certifications. Chrys specializes in IT auditing and security and is considered a thought leader in both areas.

Belinda Fremouw

Belinda Fremouw, Project and Learning Professional, leveraging over twenty years of business experience, specifically within the Project and Portfolio Management arena, my passion is educating, motivating, and inspiring individuals through the engaging design, development and delivery of interactive training programs. Specializing in all aspects of project management, leadership, client experience, management, and systems/technical curriculums, I am confident and comfortable with all audiences of all sizes. From executive leadership to call center employees, I am able to adapt my style and delivery to meet the needs of the unique audience, business and setting, including international classes. As a Professional Instructor, responsible for facilitating an extensive catalog of project management, professional development, leadership, management, and technical training courses. Consistently receive extremely high participant evaluations across all courses.

Joe Wentzel

Joe Wentzel is one of the most highly regarded subject matter experts in IT security, with over 20 years’experience in IT security. Mr. Wentzel has over 20 certifications ranging from CISM, CISA, CISSP as well as Microsoft & Cisco certifications. Mr. Wentzel started his career as a network administrator for AT&T and over the next 10 years was promoted several times, eventually reaching the position of Director of IT security. After his career at AT&T, Mr. Wentzel opened his own security consulting firm, working with large enterprise clients on security practices and procedures.

David Biggers

David Biggers has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Network Administration, System Administration, Blackboard Administration, Web Design and Web Development. Additionally, David taught part time during the evening at the college, where he instructed on Active Directory, Introduction to Computers and Networking. David has 18 years of IT experience, 17 professional IT certifications and 8 years of teaching experience.

Show all Instructors
Prerequisites / Requirements


Students should have strong understanding of IT networking & security.


Hardware Requirements: 

  • This course can be taken on either a PC or Mac device.

Software Requirements: 

  • Windows XP and later operating systems and the latest version of Internet Explorer, Firefox, Chrome, or Safari browsers. (Although Firefox or Chrome is preferred). Software must be installed and fully operational before the course begins.
  • Adobe Flash Player. Click here to download the Flash Player.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Other: Email capabilities and access to a personal email account.

Instructional material requirements: 

  • The instructional materials required for this course are included in enrollment.
More About Information Security Master Certification Training (Vouchers Included)

The registration fees for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, and Certified Information Systems Security Professional (CISSP) certification exams are included with this program.

Information Security Master Certification Training (Vouchers Included) Frequently Asked Questions
Expand All
Can I register for programs if I am an international student?

Yes, since ed2go programs are online, you never have to actually travel to the school. Most schools offer telephone or online registration.

How long does it take to complete a program?
This program is self-paced and open enrollment, so you can start and finish at your own pace. Upon registering, you're given twelve (12) months to complete this program.
What if I don't have enough time to complete my program within the time frame provided?

The time allotted to complete your program has been calculated based on the number of course hours. If after a concerted effort, you are still unable to complete your program on time, your Student Advisor will help you work out a suitable completion date. Please note that a fee may be charged for an extension.

Do I have to buy additional materials?


Can I get financial assistance?

ed2go courses are non-credit courses, so they do not qualify for federal aid. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements.

What happens when I complete the program?

Upon successful completion of the program, you will be awarded a certificate of completion. In addition, you will receive exam vouchers for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, and Certified Information Systems Security Professional (CISSP) after successful completion of the program and financial obligation. 

Am I guaranteed a job?

ed2go programs will provide you with the skills you need to obtain an entry-level position in most cases. We don’t provide direct job placement services, but our facilitators and career counselors will help you build your resume and are available to give advice on finding your first job. Facilitators will also be available to use as a professional reference upon completion of the program. Potential students should always do research on the job market in their area before registering.

Who will be my instructor?
Each student is paired with a facilitator for one-on-one interaction. The facilitator will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our facilitators are successful working professionals in the fields in which they teach.
Can I use a Mac?


How can I get more information about this program?

If you have additional questions, please feel free to contact us via LIVE CHAT or by calling us at (855) 598-3856. If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form.

When can I start the program?

Our programs are all open enrollment. You can register and start the program as soon as you are ready.

Please note: Once the program curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued.

Does this program prepare for a certification?

Yes, you will be prepared for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, Certified Information Systems Security Professional (CISSP) certification exams and you will receive exam vouchers for each exam after successful completion and financial obligation.

Browse All
Talk to an admissions counselor
Got other questions? Get in touch with us via . During non-business hours, please feel free to send us a question using the "Contact Us" button. You can also reach us by phone (855) 520-6806.