Sign In  |  View Cart  |    |  Help  |  
 
Print Course information
E-mail to a friend
Return to Course Catalog

Course Catalog > Career Certifications > Information Technology > - Security

Information Security Training (Vouchers Included)   

Prepare for three globally recognized certifications: ISACA's Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM), and (ISC)2's Certified Information Security Professional (CISSP).



Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac.

Software Requirements:

  • PC: Windows 8 or later.
  • Mac: macOS 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

  • CISA Certified Information Systems Auditor All-in-One Exam Guide
  • CISM Certified Information Security Manager All-in-One Exam Guide
  • CISSP Guide to Security Essentials

Please Note: You will receive a digital book if the physical book is on backorder.


It's no question that cybersecurity is necessary for any organization. But in this growing field, how do you show that you're qualified to lead security efforts? Certification. Holding a certification from ISACA or (ISC)2 demonstrates your ability to identify, assess, and mitigate evolving security threats.

This online cybersecurity training course will prepare you for three globally recognized certifications: ISACA's Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM), and (ISC)2's Certified Information Security Professional (CISSP).

This course offers enrollment with or without vouchers. The vouchers are prepaid access to sit for the (CISA) and (CISM) certifying exams upon eligibility. Proctor fees may apply, which are not included.

A voucher for the (CISSP) exam is not included.


  1. CISA
    1. Governance and Management of IT
    2. Information System Auditing Process
    3. IT Life Cycle Management & Systems Acquisition
    4. IT Service Management and Business Resilience
    5. Protection of Information Assets
  2. CISM
    1. Information System Auditing Process
    2. Governance and Management of IT
    3. Information Systems Acquisition
    4. Information Systems Operations and Business Resilience
    5. Protection of Information Assets
  3. CISSP
    1. Security and Risk Management
    2. Asset Security
    3. Security Engineering
    4. Communication and Network Security
    5. Identify and Access Management
    6. Security Assessment and Testing
    7. Security Operations
    8. Software Development Security

What you will learn

  • Demonstrate standard security practices to manage and assess enterprise cybersecurity networks and devices
  • Specify the proper procedures to assess vulnerabilities, report on compliance and establish controls within an enterprise.
  • Analyze security and risk management as well as safely manage security operations, assessments and testing, architectures, and assets.

How you will benefit

  • Holding Certified Information Systems Auditor (CISA) certification confirms your ability to assess vulnerabilities, compliance, and instituting controls in an enterprise
  • Holding Certified Information Security Manager (CISM) certification demonstrates your knowledge of managing, assessing, designing, and overseeing enterprise information security functions
  • Holding Certified Information Security Professional (CISSP) certification showcases your skills in security and risk management, asset security, security architecture, and network security

Jeff Rees has over 25 years of experience in the IT industry. Jeff's expertise covers a wide range of technical skills in the field of immersive technology, such as virtual reality, augmented reality, spatial computing, and holograms. He manages, creates, and delivers high-quality augmented and virtual reality technology experiences that enhance knowledge retention and engagement for learners. Jeff capitalizes on his multifaceted technical knowledge with his passion for implementing immersive solutions, which has given him a proven track record of producing one-of-a-kind solutions for clients. Jeff has previously served as a senior vice president of operations, chief technology officer, and technical director for diverse technology companies. Jeff has also taught numerous computer courses during his career. Jeff holds a bachelor's degree from DeVry University in Computer Sciences with an emphasis in Simulation Design.

 
Information Security Training (Vouchers Included)
Item: 202204CTP804581  
Fee: $3,295.00
This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.