Description
Master the advanced techniques required to protect network resources from external threat with the IT Cyber Security bundle. Built around industry best-practice guidelines, the IT Cyber Security bundle consists of three courses:
The CISA Certified Information Systems Auditor course.
The CISSP Certified Information Systems Security Professional course.
The CISM Certified Information Security Manager course.
Each course has been designed to address real world challenges, so that the technologies and techniques covered can be applied to any situation. The course is best suited to:
IT professionals responsible for audit, control and security of corporate computer and networking resources.
Consultants tasked with documenting current business system provisions and making recommendations on how to improve monitoring, control and protection provisions.
Security specialists who need to build and manage effective security solutions to protect corporate resources and data.
Junior IT security team members who would like to take their knowledge to expert level.
Individuals who need to achieve an industry-recognised qualification to prove their competence.
Using a series of instructor led videos and self-study manuals throughout each of the bundled courses, the IT Cyber Security package is delivered online using the learning platform. Learners are free to access content anyplace anytime, allowing participants to study whenever and wherever is most convenient for their needs.
A series of flash cards allow learners to test their progress, and a number of practical scenarios in each module can be used to practice common responses. End of unit tests and quizzes ensure students have fully grasped the concepts behind IT Cyber Security before moving on to the next task. Students can discuss topics with other learners using the social networking facilities, adding another valuable learning tool by which to further improve knowledge and skills.
KEY LEARNING POINTS
The IT Cyber Security package is tailored towards the evolving needs of businesses who need to protect against attack by hackers and other cybercriminals. By combining three courses into a single package, we have built a comprehensive syllabus to ensure that students have a complete understanding of internal and external security provisioning.
The CISA Certified Information Systems Auditor course takes students through:
The information systems audit process and how it is applied in a real-world environment.
The importance of applying information technology governance principles to maintain levels of security and availability.
Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements.
Codifying IT service delivery and support mechanisms and levels to ensure that systems and users remain fully productive and issues are properly prioritised.
Identifying critical information assets and designing systems to protect each from loss, theft or unauthorised access.
Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure.
Focus then shifts to the CISSP Certified Information Systems Security Professional which covers:
The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system.
Telecommunications and network systems that need to be hardened to prevent data loss or theft.
The role that information governance and risk management play in raising security standards, and how they need to be applied to corporate information systems.
The importance of secure software architecture and design to help ensure that in-house systems protect data and resources.
Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys.
Using security architecture and design principles to limit data access and potential angles of attack.
Monitoring, auditing and improving operations security to keep systems secure at the point of access.
Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage.
Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation.
Physical and environmental security considerations, like preventing theft of computer hardware or potential fire risks.
Finally, students will begin study towards the CISM Certified Information Security Manager qualification, learning about:
How to establish and maintain an information security governance framework, and the processes required to support it.
How to manage information risks to an acceptable level to meet the business and compliance requirements of the organisation.
Build, implement and operate an information security program that perfectly aligns with the wider information security strategy.
Planning the correct response to information security incidents, including defining the investigation and recovery steps required to minimise business impact.
ADVANTAGES OF THIS COURSE
Using the three-track approach to the package design, we have developed a syllabus that ensures students have the skills and experience they need to build effective real world cybersecurity defences. Learners will also be fully prepared to sit the exam and earn the qualification that accompanies each course.
Other benefits include:
An in depth understanding of information systems security and the many aspects that need to be protected.
Hands-on practical skills that will help security professionals overcome their network security challenges and build defences effective defences.
The opportunity to sit and pass the well-regarded industry CISA, CISSP and CISM qualifications.
Improved job prospects and the opportunity to progress within the IT security sector.
The IT Cyber Security course is an essential step towards earning the CISA, CISSP and CISM security qualifications. This package is also one of the most cost-effective routes to IT cyber security excellence.
Units of Study
Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
CISSP
Reviews
There are no reviews yet.