- Some of the topics include how to prevent data breaches, safeguard, protecting your personal information.
- Go step-by-step through hacking and exploiting each network/system type.
- Students will learn to design, engineer, implement and manage information security program.
Silver Cyber Security Package
IT security is a growing industry, and now is the right time to pursue a career in IT Security
- 12 months Unlimited Access
- Multimedia presentations
- Certificate of Completion
- Expert Instructor-led training
- Leads to a recognised qualification
- Prep Questions
- Student Support
What you'll learn
IT security is a growing industry, and now is the right time to pursue a career in IT Security. As an IT Security Specialist, you will be responsible for managing networks, handle any threats, implement and manage their overall information security program to protect organizations from growing sophisticated attacks. Cybersecurity roles vary based on your experience: Entry-level positions: systems engineer, IT Technician, security specialist—mid-level jobs: security technician, IT auditor. Advanced roles: cybersecurity consultant, penetration tester.
CompTIA A+ 220-1001 Core 1 & 220-1002 Core 2
The CompTIA A+ 220-1001 & 220-1002 training for the new Core Series covers expanded content on growing parts of the IT support role including an expansion of baseline security topics and a different approach to defining competency in operational procedures. CompTIA A+ 220-1001 covers mobile devices, networking technology, hardware, virtualization, and cloud computing, and network troubleshooting.
CompTIA Security+ (SY0-601)
SY0-601 Security+ is a beneficial cyber security-specific certification for IT job candidates to hold, often being the first instance where candidates learn to identify and handle InfoSec threats. This CompTIA training course is presented by instructor Gordon Shenkle. Gordan has over 30 years of IT experience with 15 of those years specializing in IT security. Students will learn the best real-world troubleshooting practices for identifying and handling cybersecurity incidents. It is recommended that students complete CompTIA A+ training and CompTIA Network+ Training before beginning this course. In this CompTIA training, you will learn how to explain threat actors and threat intelligence.
CompTIA Cybersecurity Analyst (CySA+)
This CompTIA training certification course taught by John Abueg covers applied behavioural analytics to networks and devices with the intention to prevent, detect, and combat cybersecurity threats via continuous security monitoring. The CompTIA CySA+ certification, earned after passing the CS0-002 exam, validates an IT professional’s ability to proactively defend and continuously improve the security of an organization. The course is intended for Security analysts at a Tier II level, Intermediate/mid-career cybersecurity specialists, Students holding a DoD IAT Level II or CSSP position, CompTIA Network+ or CompTIA Security+ certification holders wanting to take that next step, or anyone else wanting to expand their skillset...
Certified Information Systems Security Professional (CISSP) 2020
Alan Grayson will guide students through passing the vendor-neutral Certified Information Systems Security Professional (CISSP) certification exam. This is the ideal credential for deep technical and managerial competence, skills, experience, and credibility. Students can design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Completing Security+ beforehand is recommended. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure...
Data Security Compliance
This course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information, and different types of breaches. The security measures outlined in this course not only protect the individual (mobile devices, etc) but also protect data up to the corporate level.
Certified Ethical Hacker
White hat hackers are in demand, and instructor Chrys Thorsen will walk students through all the Certified Ethical Hacker (CEH) ECC 312-50 version 10 exam objectives. Not only will students learn to pass the certification exam, but they will learn valuable on-the-job skills for ethical hacking. Security+ is recommended to complete first. Go step-by-step through hacking and exploiting each network/system type. Tools used in the activities are a combination of Windows and Kali Linux-based, covering a broad range of examples used by ethical hackers. You will learn hands-on penetration testing and hacking skills in this course, including footprinting, scanning, and enumeration vulnerability...