Course Code: GES359
Learn about security and risk management, asset security, and security engineering.
Explore communication and network security, identity and access management, and security assessment testing.
Understand security operations, and software development security.
Study the audit process, IT governance, system and infrastructure, and media disposal process.
Explore IT service delivery and support, security design, types of attacks, business continuity, and fault tolerance
Learn about information security governance, risk management, security programs, incident management and response.
Certified Information Systems Security Professional (CISSP)
I. Security and Risk Management
B. CIA Triad Security Governance Part 1
C. CIA Triad Security Governance Part 2
D. Compliance Legal & Regulatory Issues Part 1
E. Compliance Legal & Regulatory Issues Part 2
F. Understanding Professional Ethics Part 1
G. Understanding Professional Ethics Part 2
H. Risk Management Part 1
I. Risk Management Part 2
J. Threat Modeling Acquisition Strategy & Practice Security Awareness & Training Part 1
K. Threat Modeling Acquisition Strategy & Practice Security Awareness & Training Part 2
II. Asset Security
A. Asset Security Part 1
B. Asset Security Part 2
III. Security Engineering
A. Engineering & Management of Security Part 1
B. Engineering & Management of Security Part 2
C. Engineering & Management of Security Part 3
D. Engineering & Management of Security Part 4
E. Engineering & Management of Security Part 5
F. Engineering & Management of Security Part 6
IV. Communication and Network Security
A. Apply Secure Design Principles to Networks Part 1
B. Apply Secure Design Principles to Networks Part 2
C. Apply Secure Design Principles to Networks Part 3
D. Apply Secure Design Principles to Networks Part 4
E. Apply Secure Design Principles to Networks Part 5
F. Apply Secure Design Principles to Networks Part 6
G. Securing Network Components Part 1
H. Securing Network Components Part 2
I. Design & Establish Secure Communication Channels Part 1
J. Design & Establish Secure Communication Channels Part 2
K. Design & Establish Secure Communication Channels Part 3
V. Identity and Access Management
A. Controlling Access & Managing Identity Part 1
B. Controlling Access & Managing Identity Part 2
C. Controlling Access & Managing Identity Part 3
D. Controlling Access & Managing Identity Part 4
VI. Security Assessment Testing
A. Designing Performing & Analyzing Security Testing
VII. Security Operations
A. Foundational Concepts & Investigations Part 1
B. Foundational Concepts & Investigations Part 2
C. Incident Management & Preventative Measures Part 1
D. Incident Management & Preventative Measures Part 2
E. Disaster Recovery Process Part 1
F. Disaster Recovery Process Part 2
VIII. Software Development Security
A. Understanding Applying & Enforcing Software Security Part 1
B. Understanding Applying & Enforcing Software Security Part 2
Certified Information Systems Auditor (CISA)
I. Module 1
B. Audit Process
C. Auditing Standards
D. Auditing Guidelines
E. Cobit Model
F. Audit Management
G. Internal Control Classifications
K. Audit Control Evaluation
L. C S A Control Self- Assessment
II. Module 2
A. IT Governance
B. Outsourcing & Governance
C. IT Strategy
D. Governance & Security Policies
E. Organizational Compliance
F. Outsourcing & Globalization
H. IT Performance
III. Module 3
A. System & Infrastructure
C. Project Management Tools- Part 1
D. Project Management Tools- Part 2
F. Agile Development
G. Monitoring & Controlling
H. Acquisition Process
I. Testing Process
J. Information Systems Maintenance Practices
K. Data Conversion Tools
IV. Module 4
A. Media Disposal Process
B. Post Implementation Review
C. Periodic Review
D. System Maintenance
V. Module 5
A. IT Service Delivery & Support
B. How to Evaluate Service Level Management Practices
C. Operations Management
E. Structured Query Language
F. Monitoring Performance
G. Source Code & Performance Monitoring
H. Patch Management
I. Incident Management
J. Hardware Component Types
K. Network Component Types
VI. Module 6
A. S Auditor Technical Overview
B. Security Design
C. Monitoring Systems
D. Types of Attacks
G. Asymmetric Encryption
H. Digital Certificate
I. Different Kinds of Attacks
J. Access Controls
K. Identification & Authentication
L. Physical Access Exposure
M. Environmental Security
N. Network Security Devices & Network Components
O. Network Address Translation
P. Virtual Private Networks
Q. Voice System Risks
R. Intrusion Detection
T. Firewall Implementation
U. Network Access Protection
V. Honey Pot
W. Risks to Portable & Wireless Devices
Y. OSI Networking
Z. Managing Data
VII. Module 7
A. Business Continuity & Disaster Recovery
B. Fault Tolerance
C. Business Continuity & Disaster Recovery Regulations
Certified Information Security Manager (CISM)
David Biggers, Senior Security Instructor, has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Network Administration, System Administration, Blackboard Administration, Web Design and Web Development. Additionally, David taught part time during the evening at the college, where he instructed on Active Directory, Introduction to Computers and Networking. David has 18 years of IT experience, 17 professional IT certifications and 8 years of teaching experience.
Chrys Thorsen is an experienced IT instructor with over 30 years of experience in IT. Thorsen is the founder and owner of IT without Borders, a company specializing in high-end IT consulting. Over the past 10 years, Thorsen has focused on IT certification instruction, quickly becoming a recognized industry leader in a variety of certifications.
Joe Wentzel is a master technical instructor, with a background in oil and gas exploration, seismic, financial, and IT. He is a subject matter expert in the IT security industry and has more than 20 certifications. Prior to becoming an instructor, Wentzel provided customer technical support in cabled and wireless seismic acquisition systems. He has authored numerous papers on system security and security engineering.
There are no prerequisites to take this course.
The instructional materials required for this course are included in enrollment and will be available online.
Certified Information Systems Security Professional (CISSP):
Certified Information Systems Auditor (CISA):
How to Become CISA Certified:
Certified Information Security Manager (CISM)
To take the course and sit for the CISM exam you should have experience in IT security or relevant education in IT Security.
(ISC)2 is an international association committed to ensuring the growth and learning of information security professionals. There is much at stake in this fast-paced industry, and it’s important to stay up-to-date on all the latest tools and techniques. (ISC)2 is committed to putting you at the forefront of the industry, and as the world’s leading organization dedicated to promoting IT and cybersecurity, they have the resources to do just that. When you enroll in a course certified by (ISC)2, you can be confident you’re getting the latest information and the most robust and renowned certifications in the industry.
Yes, ed2go courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country’s regulations prior to enrolling in courses that prepare for certification.
Yes, this course will prepare you for the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams.
This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.
This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive nine (9) months to complete the course.
The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.
You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.
Upon successful completion of the course, you will be awarded a certificate of completion. Students enrolled in the "voucher included" option will also receive pre-paid vouchers for the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams.
This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.
ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance
If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the “Contact Us” form.