Course Code: GES361
Begin the course by learning about networking terminology, locking down networks, wireless, security technology, risk analysis, types of attacks, and access control.
Cover network security basics, local AA, configurations, firewall, LAN, crypto, and more.
Master an understanding of architecture, enterprise risk, data center operations, application security, and more.
Explore the audit process, IT governance, system and infrastructure, and more.
Learn the media disposal process, post implementation review, periodic review, system maintenance, IT services, and more.
Understand information security governance, risk management, information security program development, implementation, and management, as well as incident management and response.
Cisco CCNA Security
Certificate of Cloud Security Knowledge (CCSK)
Certified Information Systems Auditor (CISA)
B. Audit Process
C. Auditing Standards
D. Auditing Guidelines
E. Cobit Model
F. Audit Management
G. Internal Control Classifications
K. Audit Control Evaluation
L. C S A Control Self- Assessment
A. IT Governance
B. Outsourcing and Governance
C. IT Strategy
D. Governance and Security Policies
E. Organizational Compliance
F. Outsourcing and Globalization
H. IT Performance
A. System and Infrastructure
C. Project Management Tools- Part 1
D. Project Management Tools- Part 2
F. Agile Development
G. Monitoring and Controlling
H. Acquisition Process
I. Testing Process
J. Information Systems Maintenance Practices
K. Data Conversion Tools
A. Media Disposal Process
B. Post Implementation Review
C. Periodic Review
D. System Maintenance
A. IT Service Delivery and Support
B. How to Evaluate Service Level Management Practices
C. Operations Management
E. Structured Query Language
F. Monitoring Performance
G. Source Code and Performance Monitoring
H. Patch Management
I. Incident Management
J. Hardware Component Types
K. Network Component Types
A. S Auditor Technical Overview
B. Security Design
C. Monitoring Systems
D. Types of Attacks
G. Asymmetric Encryption
H. Digital Certificate
I. Different Kinds of Attacks
J. Access Controls
K. Identification and Authentication
L. Physical Access Exposure
M. Environmental Security
N. Network Security Devices and Network Components
O. Network Address Translation
P. Virtual Private Networks
Q. Voice System Risks
R. Intrusion Detection
T. Firewall Implementation
U. Network Access Protection
V. Honey Pot
W. Risks to Portable and Wireless Devices
Y. OSI Networking
Z. Managing Data
A. Business Continuity and Disaster Recovery
B. Fault Tolerance
C. Business Continuity and Disaster Recovery Regulations
Certified Information Security Manager (CISM)
David Biggers, Senior Security Instructor, has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Network Administration, System Administration, Blackboard Administration, Web Design and Web Development. Additionally, David taught part time during the evening at the college, where he instructed on Active Directory, Introduction to Computers and Networking. David has 18 years of IT experience, 17 professional IT certifications and 8 years of teaching experience.
Chris Avants is a Sr. Cisco Instructor and leading consultant for numerous clients. He has over 15 years of experience as a network engineer, having worked with national and global clients to solve complex business problems through the use of technology and IT training solutions. For more than a decade, Avants was as a Sr. Network Engineer, designing and deploying advanced technology solutions from Cisco Systems, Microsoft, VMARE and more.
Dean R. Bushmiller has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the classroom. Dean is a courseware developer who specializes in the CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins. Dean has taught more than 1000 classes with a lifetime approval rating of +90% on topics of: CISSP, including: SOX, PCI-DSS, digital rights management, data loss prevention, incident handling, auditing for compliance, penetration testing, patch management, networking, architecture, migration, certification, and administration.
Chrys Thorsen is an experienced IT instructor with over 30 years of experience in IT. Thorsen is the founder and owner of IT without Borders, a company specializing in high-end IT consulting. Over the past 10 years, Thorsen has focused on IT certification instruction, quickly becoming a recognized industry leader in a variety of certifications.
Joe Wentzel is a master technical instructor, with a background in oil and gas exploration, seismic, financial, and IT. He is a subject matter expert in the IT security industry and has more than 20 certifications. Prior to becoming an instructor, Wentzel provided customer technical support in cabled and wireless seismic acquisition systems. He has authored numerous papers on system security and security engineering.
There are no prerequisites to take this course.
Cisco CCNA Security:
Certificate of Cloud Security Knowledge (CCSK):
Certified Information Systems Auditor (CISA):
Certified Information Security Manager (CISM):
The instructional materials required for this course are included in enrollment.
How to Become CISA Certified:
For more information on how to become CISA Certified click here.
How to Become CISM Certified
For more information on how to become CISM Certified click here.
Yes, ed2go courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country’s regulations prior to enrolling in courses that prepare for certification.
Yes, this course will prepare you for the Security+, Cisco CCNA Security, Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams and receive exam vouchers for each exam after successful completion of the course and financial obligation.
For more information on the Security+ exam and certification please click here.
For CCNA: Security exam certification requirements please click here.
For more information on the Certificate of Cloud Security Knowledge (CCSK) exam please click here.
For more information on how to become CISA Certified click here.
For more information on how to become CISM Certified Click Here.
This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.
This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive twelve (12) months to complete the course.
The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.
You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.
Upon successful completion of the course, you will be awarded a certificate of completion. In addition, you will receive exam vouchers for the Security+, Cisco CCNA Security, Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) after successful completion of the course and financial obligation.
This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.
ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance
If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the “Contact Us” form.