Course Code: GES360
Begin the course by learning about network security basics, how to secure network devices, IOS enhancement labs, local AAA, firewall basics, LAN, VPN, and more.
Cover underlying security models, cryptography, storage, virtual computing, remote access security, domain name systems, directory services, network infrastructure security, web services, buffer overflows, risk assessment and management, and more.
Explore architecture, governance and enterprise risk, legal issues, compliance and audit management, information management and data security, interoperability and portability, data center operations, incident response, application security, and virtualization.
Understand the audit process, IT governance, IT strategy, systems and infrastructure, query language, hardware component types, and more.
Dive into risk management concepts and environments, risk management planning, risk identification, risk analysis, risk monitoring and controlling, information security, and more.
Complete the course by learning about security and risk management, asset security, security engineering, communication and network security, identity and access management, security assessment testing, security operations, and software development security.
Cisco CCNA Security
CompTIA Advanced Security Practitioner (CASP)
Certificate of Cloud Security Knowledge (CCSK)
Certified Information Systems Auditor (CISA)
B. Audit Process
C. Auditing Standards
D. Auditing Guidelines
E. Cobit Model
F. Audit Management
G. Internal Control Classifications
K. Audit Control Evaluation
L. C S A Control Self- Assessment
A. IT Governance
B. Outsourcing and Governance
C. IT Strategy
D. Governance and Security Policies
E. Organizational Compliance
F. Outsourcing and Globalization
H. IT Performance
A. System and Infrastructure
C. Project Management Tools- Part 1
D. Project Management Tools- Part 2
F. Agile Development
G. Monitoring and Controlling
H. Acquisition Process
I. Testing Process
J. Information Systems Maintenance Practices
K. Data Conversion Tools
A. Media Disposal Process
B. Post Implementation Review
C. Periodic Review
D. System Maintenance
A. IT Service Delivery and Support
B. How to Evaluate Service Level Management Practices
C. Operations Management
E. Structured Query Language
F. Monitoring Performance
G. Source Code and Performance Monitoring
H. Patch Management
I. Incident Management
J. Hardware Component Types
K. Network Component Types
A. I S Auditor Technical Overview
B. Security Design
C. Monitoring Systems
D. Types of Attacks
G. Asymmetric Encryption
H. Digital Certificate
I. Different Kinds of Attacks
J. Access Controls
K. Identification and Authentication
L. Physical Access Exposure
M. Environmental Security
N. Network Security Devices and Network Components
O. Network Address Translation
P. Virtual Private Networks
Q. Voice System Risks
R. Intrusion Detection
T. Firewall Implementation
U. Network Access Protection
V. Honey Pot
W. Risks to Portable and Wireless Devices
Y. OSI Networking
Z. Managing Data
A. Business Continuity and Disaster Recovery
B. Fault Tolerance
C. Business Continuity and Disaster Recovery Regulations
PMI Risk Management Professional
Certified Information Systems Security Professional (CISSP)
Chris Avants is a Sr. Cisco Instructor and leading consultant for numerous clients. He has over 15 years of experience as a network engineer, having worked with national and global clients to solve complex business problems through the use of technology and IT training solutions. For more than a decade, Avants was as a Sr. Network Engineer, designing and deploying advanced technology solutions from Cisco Systems, Microsoft, VMARE and more.
Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins. Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.
Chrys Thorsen is an experienced IT instructor with over 30 years of experience in IT. Thorsen is the founder and owner of IT without Borders, a company specializing in high-end IT consulting. Over the past 10 years, Thorsen has focused on IT certification instruction, quickly becoming a recognized industry leader in a variety of certifications.
Belinda Fremouw has over twenty years of business experience in project and portfolio management.
Joe Wentzel is a master technical instructor, with a background in oil and gas exploration, seismic, financial, and IT. He is a subject matter expert in the IT security industry and has more than 20 certifications. Prior to becoming an instructor, Wentzel provided customer technical support in cabled and wireless seismic acquisition systems. He has authored numerous papers on system security and security engineering.
David Biggers, Senior Security Instructor, has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Network Administration, System Administration, Blackboard Administration, Web Design and Web Development. Additionally, David taught part time during the evening at the college, where he instructed on Active Directory, Introduction to Computers and Networking. David has 18 years of IT experience, 17 professional IT certifications and 8 years of teaching experience.
You should have strong understanding of IT networking & security.
The instructional materials required for this course are included in enrollment and will be available online.
If you’re an information technology professional, you’ve probably heard of Cisco. They’re one of the top companies in the industry, helping people to connect and communicate through network systems and more. They are a major provider of voiceover IP products, networking hardware, and cloud-based services, as well as many certification opportunities. These include five levels of expertise and nine different topics, such as Routing & Switching and Network Security. Cisco is the largest networking company in the world, and its prestigious status lends its certifications special credibility. When you enroll in a course certified by Cisco, you’ll know you’re getting the best—and so will your employers.
Yes, ed2go courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country’s regulations prior to enrolling in courses that prepare for certification.
Yes, you will be prepared for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, Certified Information Systems Security Professional (CISSP) certification exams and you will receive exam vouchers for each exam after successful completion and financial obligation.
This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.
This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive twelve (12) months to complete the course.
The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.
You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.
Upon successful completion of the course, you will be awarded a certificate of completion. In addition, you will receive exam vouchers for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional, and Certified Information Systems Security Professional (CISSP) after successful completion of the course and financial obligation.
This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.
ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance
If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the “Contact Us” form.