Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications Autodesk Microsoft QuickBooks Windows Computer Science Computer Science Programming Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map Resources Resources About ed2go Externship Programs Financial Assistance Find a School Blog MyCAA

CONTACT US

(855) 520-6806

See all results for ""

See All Courses

ed2go Information Technology Security Information Security Training
Return to Security
information-security-training-certification

Information Security Training

It's no question that cybersecurity is necessary for any organization. But in this growing field, how do you show that you're qualified to lead security efforts? Certification. Holding certification from ISACA or (ISC)2 demonstrates your ability to identify, assess, and mitigate evolving security threats.

This online cybersecurity training course will prepare you for three globally recognized certifications: ISACA's Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM), and (ISC)2's Certified Information Security Professional (CISSP).

This course offers enrollment with or without vouchers. The vouchers are prepaid access to sit for the certifying exams upon eligibility. Proctor fees may apply, which are not included.

9 Months / 300 Course Hrs
Open enrollment

Offered in Partnership with your Preferred School

Anoka Technical College and Anoka-Ramsey Community College

Why this school? It's been chosen based on your location or if you've visited this school's website. Change School

Bundle and Save

Include Voucher: Access to certification exam

Self-paced. Study at your own schedule

No Voucher

Self-paced. Study at your own schedule

Contact Us for additional information

Information Security Training

Contact Us

Details + Objectives

Course Code: GES359

What You Will Learn
  • Demonstrate standard security practices to manage and assess enterprise cybersecurity networks and devices
  • Specify the proper procedures to assess vulnerabilities, report on compliance and establish controls within an enterprise.
  • Analyze security and risk management as well as safely manage security operations, assessments and testing, architectures, and assets.
How the course is taught
  • Self-paced, online course
  • 9 Months Duration of access
  • Open enrollment, begin anytime
  • 300 Course hours
How you will benefit
  • Holding Certified Information Systems Auditor (CISA) certification confirms your ability to assess vulnerabilities, compliance, and instituting controls in an enterprise
  • Holding Certified Information Security Manager (CISM) certification demonstrates your knowledge of managing, assessing, designing, and overseeing enterprise information security functions
  • Holding Certified Information Security Professional (CISSP) certification showcases your skills in security and risk management, asset security, security architecture, and network security

Outline

Expand All
Details
  1. CISA
    1. Governance and Management of IT
    2. Information System Auditing Process
    3. IT Life Cycle Management & Systems Acquisition
    4. IT Service Management and Business Resilience
    5. Protection of Information Assets
  2. CISM
    1. Information System Auditing Process
    2. Governance and Management of IT
    3. Information Systems Acquisition
    4. Information Systems Operations and Business Resilience
    5. Protection of Information Assets
  3. CISSP
    1. Security and Risk Management
    2. Asset Security
    3. Security Engineering
    4. Communication and Network Security
    5. Identify and Access Management
    6. Security Assessment and Testing
    7. Security Operations
    8. Software Development Security

Instructors & Support

David Grimes

David Grimes has more than 10 years of management and leadership experience in the private and non-profit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in Technology Education.

Requirements

Requirements

Prerequisites:

While there are no prerequisites to take this course bundle, ISACA and (ISC)2 both require at least five years of information security work experience to be eligible for the certification exams.

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac.

Software Requirements:

  • PC: Windows 8 or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.
Instructional Materials

The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

  • CISA Certified Information Systems Auditor All-in-One Exam Guide
  • CISM Certified Information Security Manager All-in-One Exam Guide
  • CISSP Guide to Security Essentials

More About

Exam Requirements:

Certified Information Systems Security Professional (CISSP):

  • Candidates must have a minimum of 5 years of cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP CBK®. Candidates may receive a one-year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience in 2 or more of the 8 domains of the CISSP CBK.

Certified Information Systems Auditor (CISA):

  • To take the course and sit for the CISA exam you should have experience in IT auditing or relevant education in that area.

How to Become CISA Certified:

  1. Successful completion of the CISA examination
  2. Submit an Application for CISA Certification
  3. Adherence to the Code of Professional Ethics
  4. Adherence to the Continuing Professional Education Program
  5. Compliance with the Information Systems Auditing Standards

Certified Information Security Manager (CISM)

To take the course and sit for the CISM exam you should have experience in IT security or relevant education in IT Security.

CISM Certification

  1. Successfully pass the CISM exam.
  2. Adhere to ISACA's Code of Professional Ethics.
  3. Agree to comply with the Continuing Education Policy.
  4. Work experience in the field of information security.
  5. Submit an Application for CISM Certification.

FAQs

Expand All
Can I register for a course if I am an international student?

Yes, ed2go courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country's regulations prior to enrolling in courses that prepare for certification.

Does this course prepare for a certification?

Yes, this course will prepare you for the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams.

  • For more information on CISSP certification please click here.

  • For more information on how to become CISA Certified click here.

  • For more information on how to become CISM Certified Click Here.

When can I start the course?

This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.

How long does it take to complete this course?

This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive nine (9) months to complete the course.

What if I don't have enough time to complete my course within the time frame provided?

The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.

What kind of support will I receive?

You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.

What happens when I complete the course?

Upon successful completion of the course, you will be awarded a certificate of completion. Students enrolled in the "voucher included" option will also receive pre-paid vouchers for the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams.

Am I guaranteed a job?

This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.

Can I get financial assistance?

This course is non-credit, so it does not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance

How can I get more information about this course?

If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us" form.

Browse All

About Certification

(ISC)2

(ISC)2 is an international association committed to ensuring the growth and learning of information security professionals. There is much at stake in this fast-paced industry, and it’s important to stay up-to-date on all the latest tools and techniques. (ISC)2 is committed to putting you at the forefront of the industry, and as the world’s leading organization dedicated to promoting IT and cybersecurity, they have the resources to do just that. When you enroll in a course certified by (ISC)2, you can be confident you’re getting the latest information and the most robust and renowned certifications in the industry.