Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Other Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications AutoCAD Microsoft QuickBooks Windows Other Computer Programming Computer Programming Programming Classes Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Other Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map Skill Map Learn More How It Works How It Works About ed2go Externship Programs Financial Assistance Find a School Military Virtual Career Center
Courses
Arts and Design
Animation
Graphic Arts
Photography
Web Design
Other
Business
Accounting
Administrative
Communication
Finance
Marketing and Sales
Operations
Project Management
Small Business
Soft Skills
Career Online High School
Online High School Diploma
Computer Applications
AutoCAD
Microsoft
QuickBooks
Windows
Other
Computer Programming
Programming Classes
Construction and Trades
Construction
Environmental and Energy
Trades
Health and Fitness
Alternative Medicine
Dental
Fitness
Medical
Veterinary
Wellness
Hospitality
Hospitality Service
Information Technology
Cloud Computing
Networking
Other
Security
Language
Languages
Legal
Legal Studies
Math and Science
Mathematics and Science
Teacher Professional Development
Child Development
Classroom Technology
Math and Science
Reading and Writing
Other
Test Prep
Exam Prep
Writing
Writing and Editing
Skill Map
Learn More
How It Works
About ed2go Externship Programs Financial Assistance Find a School Military Virtual Career Center
ed2go Information Technology Security Information Security Training
Return to Security
information-security-training-certification

Information Security Training

You will complete the CISA, CISM and CISSP certification training programs and gain 3 of the highest level certifications available in the IT security industry. IT Security is the fastest growing sector of IT and is projected to grow even more rapidly in upcoming years. Having these credentials will ensure you are marketable and competitive for the positions in this area of the IT field.

The registration fees for the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams are included with this program. 

9 Months / 165 Course Hrs
Open Enrollment

Offered in Partnership with your Preferred School

Association of Executive and Administrative Professionals Why this school? It's been chosen based on your location or if you've visited this school's website.

Financial Assistance Available*

Change School

Bundle and Save

Contact Us

Information Security Training

Bundle and Save

Contact Us

Information Security Training (Vouchers Included) Details + Objective

Course Code: GES359

You Will Learn
  • Become proficient in a variety of areas within IT security
  • Develop the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise
  • Learn deep technical and managerial competence
  • Understand how to design, engineer, implement, and manage overall information security to protect organizations from growing sophisticated attacks
How the course is taught
  • Self-paced, online course
  • 9 months to complete
  • Open enrollment, begin anytime
  • 165 course hours
How you will benefit
  • Prepare yourself with the marketability needed to compete for high paying positions in this field
  • Gain 3 of the highest level certifications available in the IT security industry
  • Become an expert in IT policy management, especially in the IT Security sector
Information Security Training (Vouchers Included) Outline
Expand All
Certified Information Systems Security Professional (CISSP) Part I

Learn about security and risk management, asset security, and security engineering.

Certified Information Systems Security Professional (CISSP) Part II

Explore communication and network security, identity and access management, and security assessment testing.

Certified Information Systems Security Professional (CISSP) Part III

Understand security operations, and software development security.

Certified Information Systems Auditor (CISA) Part I

Study the audit process, IT governance, system and infrastructure, and media disposal process.

Certified Information Systems Auditor (CISA) Part II

Explore IT service delivery and support, security design, types of attacks, business continuity, and fault tolerance

Certified Information Security Manager (CISM) Part I

Learn about information security governance, risk management, security programs, incident management and response.

Program Details

Certified Information Systems Security Professional (CISSP)
    I.    Security and Risk Management
                A.     Introduction
                B.    CIA Triad Security Governance Part 1
                C.    CIA Triad Security Governance Part 2
                D.    Compliance Legal & Regulatory Issues Part 1
                E.    Compliance Legal & Regulatory Issues Part 2
                F.    Understanding Professional Ethics Part 1
                G.    Understanding Professional Ethics Part 2
                H.    Risk Management Part 1
                I.    Risk Management Part 2
                J.    Threat Modeling Acquisition Strategy & Practice Security Awareness & Training Part 1
                K.    Threat Modeling Acquisition Strategy & Practice Security Awareness & Training Part 2
    II.    Asset Security
                A.    Asset Security Part 1
                B.    Asset Security Part 2
    III.    Security Engineering
                A.    Engineering & Management of Security Part 1
                B.    Engineering & Management of Security Part 2
                C.    Engineering & Management of Security Part 3
                D.    Engineering & Management of Security Part 4
                E.    Engineering & Management of Security Part 5
                F.    Engineering & Management of Security Part 6
    IV.    Communication and Network Security
                A.    Apply Secure Design Principles to Networks Part 1
                B.    Apply Secure Design Principles to Networks Part 2
                C.    Apply Secure Design Principles to Networks Part 3
                D.    Apply Secure Design Principles to Networks Part 4
                E.    Apply Secure Design Principles to Networks Part 5
                F.    Apply Secure Design Principles to Networks Part 6
                G.    Securing Network Components Part 1
                H.    Securing Network Components Part 2
                I.    Design & Establish Secure Communication Channels Part 1
                J.    Design & Establish Secure Communication Channels Part 2
                K.    Design & Establish Secure Communication Channels Part 3
    V.    Identity and Access Management
                A.    Controlling Access & Managing Identity Part 1
                B.    Controlling Access & Managing Identity Part 2
                C.    Controlling Access & Managing Identity Part 3
                D.    Controlling Access & Managing Identity Part 4
    VI.    Security Assessment Testing
                A.    Designing Performing & Analyzing Security Testing
    VII.    Security Operations
                A.    Foundational Concepts & Investigations Part 1
                B.    Foundational Concepts & Investigations Part 2
                C.    Incident Management & Preventative Measures Part 1
                D.    Incident Management & Preventative Measures Part 2
                E.    Disaster Recovery Process Part 1
                F.    Disaster Recovery Process Part 2
    VIII.    Software Development Security
                A.    Understanding Applying & Enforcing Software Security Part 1
                B.    Understanding Applying & Enforcing Software Security Part 2
                C.    Conclusion

Certified Information Systems Auditor (CISA)
    I. Module 1
                A.        Introduction
                B.        Audit Process
                C.        Auditing Standards
                D.        Auditing Guidelines
                E.        Cobit Model
                F.        Audit Management
                G.        Internal Control Classifications
                H.        Planning
                I.        Program
                J.        Evidence
                K.        Audit Control Evaluation
                L.        C S A Control Self- Assessment
    II. Module 2
                A.        IT Governance
                B.        Outsourcing & Governance
                C.        IT Strategy
                D.        Governance & Security Policies
                E.        Organizational Compliance
                F.        Outsourcing & Globalization
                G.        Outsourcing
                H.        IT Performance
    III. Module 3
                A.        System & Infrastructure
                B.        Requirements
                C.        Project Management Tools- Part 1
                D.        Project Management Tools- Part 2
                E.        Applications
                F.        Agile Development
                G.        Monitoring & Controlling
                H.        Acquisition Process
                I.        Testing Process
                J.        Information Systems Maintenance Practices
                K.        Data Conversion Tools
    IV. Module 4
                A.        Media Disposal Process
                B.        Post Implementation Review
                C.        Periodic Review
                D.        System Maintenance
    V. Module 5
                A.        IT Service Delivery & Support
                B.        How to Evaluate Service Level Management Practices
                C.        Operations Management
                D.        Databases
                E.        Structured Query Language
                F.        Monitoring Performance
                G.        Source Code & Performance Monitoring
                H.        Patch Management
                I.        Incident Management
                J.        Hardware Component Types
                K.        Network Component Types
    VI. Module 6
                A.        S Auditor Technical Overview
                B.        Security Design
                C.        Monitoring Systems
                D.        Types of Attacks
                E.        Cryptography
                F.        Encryption
                G.        Asymmetric Encryption
                H.        Digital Certificate
                I.        Different Kinds of Attacks
                J.        Access Controls
                K.        Identification & Authentication
                L.        Physical Access Exposure
                M.        Environmental Security
                N.        Network Security Devices & Network Components
                O.        Network Address Translation
                P.        Virtual Private Networks
                Q.        Voice System Risks
                R.        Intrusion Detection
                S.        Firewalls
                T.        Firewall Implementation
                U.        Network Access Protection
                V.        Honey Pot
                W.        Risks to Portable & Wireless Devices
                X.        Bluetooth
                Y.        OSI Networking
                Z.        Managing Data
    VII. Module 7
                A.        Business Continuity & Disaster Recovery
                B.        Fault Tolerance
                C.        Business Continuity & Disaster Recovery Regulations

Certified Information Security Manager (CISM)

  1. Module 1: Information Security Governance
  2. Module 2: Risk Management
  3. Module 3: Information Security Program Development
  4. Module 4: Information Security Program Implementation
  5. Module 5: Information Security Program Management
  6. Module 6: Incident Management and Response 

 

View All Sections
Information Security Training (Vouchers Included) Instructors
David Biggers

David Biggers has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Network Admin and Web Services Manager with KCTCS in Kentucky. He performedmultiple jobs being on the IT team. Network Administration, System Administration, Blackboard Administration, Web Design and Web Development. Additionally, David taught part time during the evening at the college, where he instructed on Active Directory, Introduction to Computers and Networking. David has 18 years of IT experience, 17 professional IT certifications and 8 years of teaching experience. 

Chrys Thorsen

Chrys Thorsen is an experienced IT instructor with over 30 years’ experience in IT. Chrys has over 35 certifications including Cisco CCNP/CCSI, Microsoft MCITP/MCSE/MCT, CISSP and CISA. Chrys is the founder and owner of IT without Borders, a company specializing in high end IT consulting. Over the past 10 years, Chrys has focused on IT certification instruction, quickly becoming a recognized industry leader in a variety of certifications. Chrys specializes in IT auditing and security and is considered a thought leader in both areas.

Joe Wentzel

Joe Wentzel is a master technical instructor with varied background working in a variety of industries including, but not limited, to oil and gas exploration, seismic, financial, IT, social services and travel. Joe has over 20 certifications and is an industry leading subject matter expert in the field of IT security. Prior to becoming an instructor, Mr. Wentzel was in Field Service providing customer technical support in cabled and wireless seismic acquisition systems. Joe has written many papers on system security and security engineering and is recognized as one of the top subject matter experts on CISM in the world.

Show all Instructors
Information Security Training (Vouchers Included) Requirements / Prerequisites

Certified Information Systems Security Professional (CISSP)

Candidates must have a minimum of 5 years cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP CBK®Candidates may receive a one year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience in 2 or more of the 8 domains of the CISSP CBK.

For more information on CISSP certification please click here.

Certified Information Systems Auditor (CISA)

To take the program and sit for the CISA exam students should have experience in IT auditing or relevant education in that area.

How to Become CISA Certified:

For more information on how to become CISA Certified click here.

  1. Successful completion of the CISA examination
  2. Submit an Application for CISA Certification
  3. Adherence to the Code of Professional Ethics
  4. Adherence to the Continuing Professional Education Program
  5. Compliance with the Information Systems Auditing Standards

Certified Information Security Manager (CISM)

To take the program and sit for the CISM exam students should have experience in IT security or relevant education in IT Security.

CISM Certification

  1. Successfully pass the CISM exam.
  2. Adhere to ISACA's Code of Professional Ethics.
  3. Agree to comply with the Continuing Education Policy.
  4. Work experience in the field of information security.
  5. Submit an Application for CISM Certification.

For more information on how to become CISM Certified Click Here.

This program can be taken from either a Mac or a PC. It is compatible with the Windows 2000 and later operating systems and any browsers.

There are no specific computer requirements other than an Internet connection and e-mail account. We recommend that you use the latest version of the browser you choose.

The materials for this program are all available online.

Information Security Training (Vouchers Included) Frequently Asked Questions
Expand All
Can I register for programs if I am an international student?

Yes, because ed2go programs are online you never have to actually travel to the school. Most schools offer telephone or online registration.

How long does it take to complete a program?

All of our programs are self-paced and open enrollment, so you can start them when you want and finish them at your own pace. When you register, you’ll receive nine (9) months to complete the program. 

What if I don't have enough time to complete my program within the time frame provided?

The time allotted to complete your program has been calculated based on the number of hours for each program, so don't worry too much about not completing in time. If, after a concerted effort, you are still unable to complete, your Student Advisor will help you work out a suitable completion date. Please note that a fee may be charged for an extension.

Do I have to buy additional materials?

No.

Can I get financial assistance?

ed2go courses are non-credit courses, so they do not qualify for federal aid. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements.

What happens when I complete the program?

Upon successful completion of the program, you will be awarded a certificate of completion. In addition, you will receive an exam vouchers for the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams after successful completion of the program and financial obligation.

Am I guaranteed a job?

ed2go programs will provide you with the skills you need to obtain an entry-level position in most cases. We don’t provide direct job placement services, but our facilitators and career counselors will help you build your resume and are available to give advice on finding your first job. Facilitators will also be available to use as a professional reference upon completion of the program. Potential students should always do research on the job market in their area before registering.

Who will be my instructor?

Each student is paired with a facilitator for one-on-one interaction. The facilitator will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our facilitators are successful working professionals in the fields in which they teach.

What software or hardware do I need in order to take online programs and what are the system requirements?

In order to take our online programs, you must have access to a computer and the Internet. You can access the program contents from any Web-enabled computer. You don’t have to use the same computer to log-in to the program every time. We recommend that you have a word-processing program (Microsoft Word is the best) and the latest version of Internet Explorer.

Can I use a Mac?

Yes.

How can I get more information about this program?

If you have questions that are not answered on our website, please feel free to contact us via LIVE chat (click the button above). If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form to the right. You may also call us at 1-877-221-5151. We will answer your questions promptly.

When can I start the program?

Our programs are all open enrollment. You can register and start the program as soon as you are ready. 

Please note: Once the program curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued.

Does this program prepare for a certification?

Yes, this program will prepare you for the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams and receive a voucher for the exams after successful completion of the program and financial obligation.

For more information on CISSP certification please click here

For more information on how to become CISA Certified click here

For more information on how to become CISM Certified Click Here

Browse All
Talk to an admissions counselor
Got other questions? Get in touch with our admissions counselors via . During non-business hours, please feel free to send us a question using the "Contact Us" button. You can also reach us by phone at (855) 520-6806.