Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Other Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications AutoCAD Microsoft QuickBooks Windows Other Computer Programming Computer Programming Programming Classes Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Other Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map Skill Map Learn More How It Works How It Works About ed2go Externship Programs Financial Assistance Find a School Military Virtual Career Center
Courses
Arts and Design
Animation
Graphic Arts
Photography
Web Design
Other
Business
Accounting
Administrative
Communication
Finance
Marketing and Sales
Operations
Project Management
Small Business
Soft Skills
Career Online High School
Online High School Diploma
Computer Applications
AutoCAD
Microsoft
QuickBooks
Windows
Other
Computer Programming
Programming Classes
Construction and Trades
Construction
Environmental and Energy
Trades
Health and Fitness
Alternative Medicine
Dental
Fitness
Medical
Veterinary
Wellness
Hospitality
Hospitality Service
Information Technology
Cloud Computing
Networking
Other
Security
Language
Languages
Legal
Legal Studies
Math and Science
Mathematics and Science
Teacher Professional Development
Child Development
Classroom Technology
Math and Science
Reading and Writing
Other
Test Prep
Exam Prep
Writing
Writing and Editing
Skill Map
Learn More
How It Works
About ed2go Externship Programs Financial Assistance Find a School Military Virtual Career Center
ed2go Information Technology Security IT Security Survival Training
Return to Security
cyber-security-certification

IT Security Survival Training

With over 5 certifications being covered in this training program, you will be prepared for a variety of positions within the IT security sector. You will cover all areas of security; ranging from data protection, info vulnerabilities, risk assessment, cloud security, and security analysis. In covering all these areas, you will not just understand the technical aspects of IT security but also how to manage and write policy to govern security practices. The market for IT security is growing rapidly, with double digit percentage growth yearly. This has created a large amount of available positions, many of them paying over 100k per year in salary. You will also be able to login via virtual machines to live infrastructure and practice on live environments. Live Labs provide a true “hands-on” experience, right from the comfort of one’s home or office. You will have full access to a variety of preconfigured virtual exercises as well as the ability to practice without restriction on the lab equipment.

In today’s world of complex IT systems and technologies it is essential that IT professionals are able to demonstrate how to use and understand vendor products and software. Using Live Labs allows you to develop your practical IT skills in a safe working environment without the need to invest in your own hardware and software. Upon completion of this program, you will be prepared for the Security+, Cisco CCNA Security, Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), and Certificate of Cloud Security Knowledge (CCSK) certification exams. The registration fees for these exams are included with this program.

12 Months / 225 Course Hrs
Open Enrollment

Offered in Partnership with your Preferred School

George Mason University Why this school? It's been chosen based on your location or if you've visited this school's website.

Financial Assistance Available*

Change School

Bundle and Save

Contact Us

IT Security Survival Training

Bundle and Save

Contact Us

IT Security Survival Training (Vouchers Included) Details + Objective

Course Code: GES361

You Will Learn
  • Receive training in all areas of IT security
  • Understand data protection, info vulnerabilities, risk assessment, cloud security, and security analysis
  • Learn how to manage and write policy to govern security practices
  • Learn how to combat against hacking and intrusion
  • Understand how to use vendor products and software
How the course is taught
  • Self-paced, online course
  • 12 months to complete
  • Open enrollment, begin anytime
  • 225 course hours
How you will benefit
  • Open the door to new opportunities in a variety of positions within the IT security sector
  • Develop your practical IT skills in a safe working environment without the need to invest in your own hardware and software
  • Have full access to a variety of preconfigured virtual exercises as well as the ability to practice without restriction on the lab equipment
  • Be prepared for the Security+, Cisco CCNA Security, Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), and Certificate of Cloud Security Knowledge (CCSK) certification exams
IT Security Survival Training (Vouchers Included) Outline
Expand All
Security+

Begin the course by learning about networking terminology, locking down networks, wireless, security technology, risk analysis, types of attacks, and access control.

Cisco CCNA Security

Cover network security basics, local AA, configurations, firewall, LAN, cryto, and more.

Certificate of Cloud Security Knowledge (CCSK)

Master an understanding of architecture, enterprise risk, data center operations, application security, and more.

Certified Information Systems Auditor (CISA)

Explore the audit process, IT governance, system and infrastructure, and more.

Certified Information Systems Auditor (CISA)—Continued

Learn the media disposal process, post implementation review, periodic review, system maintenance, IT services, and more.

Certified Information Security Manager (CISM)

Understand information security governance, risk management, information security program development, implementation, and management, as well as incident management and response.

Program Details

Security+

  1.     Networking Terminology
  2.     Locking Down or Network
  3.     Wireless
  4.     Intro to Security Terminology
  5.     Policies and Standards
  6.     Physical Security
  7.     Risk Analysis
  8.     Disaster Recovery, Business Continuity and BIA (Business Impact Analysis)
  9.     Introduction to Computer Forensics
  10.     Types of Attacks
  11.     System Security Threats
  12.     Security Assessments
  13.     Monitoring and Auditing
  14.     Authentication
  15.     Access Control
  16.     Mitigating Security Threats
  17.     Implementing System Security
  18.     Cryptography
  19.     Public Key Infrastructure
  20.     Live Labs


Cisco CCNA Security

  1.     Introduction
  2.     Network Security Basics I
  3.     Network Security Basics II
  4.     Securing Network Devices I
  5.     Securing Network Devices Lab I
  6.     IOS Enhancement Lab
  7.     Securing Network Devices II
  8.     Securing Network Devices Lab II
  9.     Using CCP to Configure SNMP Lab
  10.     Say Hello to AAA
  11.     Local AA
  12.     Configuring Local AAA with CCP
  13.     Firewall Basics Using ACLs
  14.     Intro Firewall
  15.     Content Based Access Control Firewall
  16.     Zoned Based Firewalls
  17.     Zoned Based Firewalls Lab
  18.     Configuring Advanced Firewall with CCP
  19.     Securing The LAN
  20.     Welcome to Cryto
  21.     VPN
  22.     Remote Access VPNS
  23.     VPN Lab
  24.     Managing A Secure Network
  25.     Outro
  26.     Live Labs


Certificate of Cloud Security Knowledge (CCSK)

  1. Architecture
  2. Governance and Enterprise Risk
  3. Legal Issues - Contracts and Electronic
  4. Compliance and Audit Management
  5. Information Management and Data Security
  6. Interoperability and Portability
  7. Traditional Security, Business Continuity, and Disaster Recovery
  8. Data Center Operations
  9. Incident Response
  10. Application Security
  11. Encryption and Key Management
  12. Identity, Entitlement, and Access Management
  13. Virtualization
  14. Security as a Service


Certified Information Systems Auditor (CISA)

  1. Module 1

                A.        Introduction
                B.        Audit Process
                C.        Auditing Standards
                D.        Auditing Guidelines
                E.        Cobit Model
                F.        Audit Management
                G.        Internal Control Classifications
                H.        Planning
                I.        Program
                J.        Evidence
                K.        Audit Control Evaluation
                L.        C S A Control Self- Assessment

 

  1. Module 2

                A.        IT Governance
                B.        Outsourcing and Governance
                C.        IT Strategy
                D.        Governance and Security Policies
                E.        Organizational Compliance
                F.        Outsourcing and Globalization
                G.        Outsourcing
                H.        IT Performance

 

 

 

  1. Module 3

                A.        System and Infrastructure
                B.        Requirements
                C.        Project Management Tools- Part 1
                D.        Project Management Tools- Part 2
                E.        Applications
                F.        Agile Development
                G.        Monitoring and Controlling
                H.        Acquisition Process
                I.        Testing Process
                J.        Information Systems Maintenance Practices
                K.        Data Conversion Tools

 

 

 

  1. Module 4

                A.        Media Disposal Process
                B.        Post Implementation Review
                C.        Periodic Review
                D.        System Maintenance

 

 

 

  1. Module 5

                A.        IT Service Delivery and Support
                B.        How to Evaluate Service Level Management Practices
                C.        Operations Management
                D.        Databases
                E.        Structured Query Language
                F.        Monitoring Performance
                G.        Source Code and Performance Monitoring
                H.        Patch Management
                I.        Incident Management
                J.        Hardware Component Types
                K.        Network Component Types

 

 

 

  1. Module 6

                A.        S Auditor Technical Overview
                B.        Security Design
                C.        Monitoring Systems
                D.        Types of Attacks
                E.        Cryptography
                F.        Encryption
                G.        Asymmetric Encryption
                H.        Digital Certificate
                I.        Different Kinds of Attacks
                J.        Access Controls
                K.        Identification and Authentication
                L.        Physical Access Exposure
                M.        Environmental Security
                N.        Network Security Devices and Network Components
                O.        Network Address Translation
                P.        Virtual Private Networks
                Q.        Voice System Risks
                R.        Intrusion Detection
                S.        Firewalls
                T.        Firewall Implementation
                U.        Network Access Protection
                V.        Honey Pot
                W.        Risks to Portable and Wireless Devices
                X.        Bluetooth
                Y.        OSI Networking
                Z.        Managing Data

 

 

 

  1. Module 7

                A.        Business Continuity and Disaster Recovery
                B.        Fault Tolerance
                C.        Business Continuity and Disaster Recovery Regulations

Certified Information Security Manager (CISM)

  1. Information Security Governance
  2. Risk Management
  3. Information Security Program Development
  4. Information Security Program Implementation
  5. Information Security Program Management
  6. Incident Management and Response

 

View All Sections
IT Security Survival Training (Vouchers Included) Instructors
David Biggers

Security+:

David Biggers, Senior Security Instructor, has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Network Administration, System Administration, Blackboard Administration, Web Design and Web Development. Additionally, David taught part time during the evening at the college, where he instructed on Active Directory, Introduction to Computers and Networking. David has 18 years of IT experience, 17 professional IT certifications and 8 years of teaching experience. 

Chris Avants

CCNA Security:

Chris Avants is a Sr. Cisco Instructor and leading consultant for clients throughout the U.S. Chris has over 15 years’ experience as a network engineer and 5 additional years as an instructor. Chris has worked at the service provider/partner level throughout his career, working with national and global clients to solve complex business problems through the use of technology and IT training solutions. Working with Chris, you will see a true industry expert with experience, drive, and patience unparalleled in the industry. Chris began his career with GE Capital IT Solutions at the age of 17. He quickly gained multiple professional-level certifications from Cisco and Microsoft. Chris spent the next decade as a Sr. Network Engineer designing and deploying advanced technology solutions from Cisco Systems, Microsoft, VMARE and more. Originally hired for his unique skillset and experience with APPLE Networking, Chris spent his free time learning new networking technologies and concepts. The time invested quickly paid-off as he earned a coveted Microsoft Certified Systems Engineer certification at the age of 17. He joined an engineering team where he would gain his first hands-on experience with Microsoft Windows & Exchange Server, in addition to Cisco Routers and Switches. By age 18, Chris earned his CCNA and was a leading implementation engineer for GE Capital’s K-12 and Enterprise customer base throughout Texas for the next several years.

Dean R. Bushmiller

CCSK:

Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins.

Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.

Chrys Thorsen

CISA:

Chrys Thorsen is an experienced IT instructor with over 30 years’ experience in IT. Chrys has over 35 certifications including Cisco CCNP/CCSI, Microsoft MCITP/MCSE/MCT, CISSP and CISA. Chrys is the founder and owner of IT without Borders, a company specializing in high end IT consulting. Over the past 10 years, Chrys has focused on IT certification instruction, quickly becoming a recognized industry leader in a variety of certifications. Chrys specializes in IT auditing and security and is considered a thought leader in both areas.

Joe Wentzel

CISM:

Joe Wentzel is one of the most highly regarded subject matter experts in IT security, with over 20 years’ experience in IT security. Mr. Wentzel has over 20 certifications ranging from CISM, CISA, CISSP as well as Microsoft & Cisco certifications. Mr. Wentzel started his career as a network administrator for AT&T and over the next 10 years was promoted several times, eventually reaching the position of Director of IT security. After his career at AT&T, Mr. Wentzel opened his own security consulting firm, working with large enterprise clients on security practices and procedures.

Show all Instructors
IT Security Survival Training (Vouchers Included) Requirements / Prerequisites

Security+

Students should have a CompTIA Network+ certification and two years of experience in IT administration with a security focus.

For more information on the Security+ exam and certification please click here.

Cisco CCNA Security

Students should have a fundamental understanding of networking.

A valid CCENT or a valid CCNA Routing and Switching or any CCIE certification can act as a prerequisite to take the 210-260 IINS Exam.

For CCNA: Security exam certification requirements please click here.

Certificate of Cloud Security Knowledge (CCSK)

There are no prerequisites for the Certificate of Cloud Security Knowledge (CCSK) exam.

For more information on the Certificate of Cloud Security Knowledge (CCSK) exam please click here.

Certified Information Systems Auditor (CISA)

To take the program and sit for the CISA exam students should have experience in IT auditing or relevant education in that area.

How to Become CISA Certified:

For more information on how to become CISA Certified click here.

  1. Successful completion of the CISA examination
  2. Submit an Application for CISA Certification
  3. Adherence to the Code of Professional Ethics
  4. Adherence to the Continuing Professional Education Program
  5. Compliance with the Information Systems Auditing Standards

Certified Information Security Manager (CISM)

To take the program and sit for the CISM exam students should have experience in IT security or relevant education in IT Security.

CISM Certification

  1. Successfully pass the CISM exam.
  2. Adhere to ISACA's Code of Professional Ethics.
  3. Agree to comply with the Continuing Education Policy.
  4. Work experience in the field of information security.
  5. Submit an Application for CISM Certification.

For more information on how to become CISM Certified click here.

This program can be taken from either a Mac or a PC. It is compatible with the Windows 2000 and later operating systems and any browsers.

There are no specific computer requirements other than an Internet connection and e-mail account. We recommend that you use the latest version of the browser you choose.

The materials for this program are all available online.

IT Security Survival Training (Vouchers Included) Frequently Asked Questions
Expand All
Can I register for programs if I am an international student?

Yes, because ed2go programs are online you never have to actually travel to the school. Most schools offer telephone or online registration.

How long does it take to complete a program?

All of our programs are self-paced and open enrollment, so you can start them when you want and finish them at your own pace. When you register, you’ll receive twelve (12) months to complete the program.

What if I don't have enough time to complete my program within the time frame provided?

The time allotted to complete your program has been calculated based on the number of hours for each program, so don't worry too much about not completing in time. If, after a concerted effort, you are still unable to complete, your Student Advisor will help you work out a suitable completion date. Please note that a fee may be charged for an extension.

Do I have to buy additional materials?

No.

Can I get financial assistance?

ed2go courses are non-credit courses, so they do not qualify for federal aid. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements.

What happens when I complete the program?

Upon successful completion of the program, you will be awarded a certificate of completion. In addition, you will receive exam vouchers for the Security+, Cisco CCNA Security, Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) after successful completion of the program and financial obligation. 

Am I guaranteed a job?

ed2go programs will provide you with the skills you need to obtain an entry-level position in most cases. We don’t provide direct job placement services, but our facilitators and career counselors will help you build your resume and are available to give advice on finding your first job. Facilitators will also be available to use as a professional reference upon completion of the program. Potential students should always do research on the job market in their area before registering.

Who will be my instructor?

Each student is paired with a facilitator for one-on-one interaction. The facilitator will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our facilitators are successful working professionals in the fields in which they teach.

What software or hardware do I need in order to take online programs and what are the system requirements?

In order to take our online programs, you must have access to a computer and the Internet. You can access the program contents from any Web-enabled computer. You don’t have to use the same computer to log-in to the program every time. We recommend that you have a word-processing program (Microsoft Word is the best) and the latest version of Internet Explorer.

Can I use a Mac?

Yes.

How can I get more information about this program?

If you have questions that are not answered on our website, please feel free to contact us via LIVE chat (click the button above). If you are visiting us during non-business hours, please feel free to send us a question using the “Contact Us” form to the right. You may also call us at 1-877-221-5151. We will answer your questions promptly.

When can I start the program?

Our programs are all open enrollment. You can register and start the program as soon as you are ready.


Please note: Once the program curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued.

Does this program prepare for a certification?

Yes, this course will prepare you for the Security+, Cisco CCNA Security, Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams and receive exam vouchers for each exam after successful completion of the program and financial obligation.

For more information on the Security+ exam and certification please click here.

For CCNA: Security exam certification requirements please click here.

For more information on the Certificate of Cloud Security Knowledge (CCSK) exam please click here.

For more information on how to become CISA Certified click here.

For more information on how to become CISM Certified Click Here.

Browse All
Talk to an admissions counselor
Got other questions? Get in touch with our admissions counselors via . During non-business hours, please feel free to send us a question using the "Contact Us" button. You can also reach us by phone at (855) 520-6806.