• Home
  • Course Catalog
  • Contact Us
  • Request info
    Contact Us
    First Name*
    Last Name*
    Email
    Phone
    Questions/Comments
    Lead Status
    Lead Source*
    Referral Information
    External Referrer
    Partner SMEC ID
    Enter text from the pic*

    Cyber-Security Professional with Labs

    $4,495.00

    Additional information

    WE-IT-7201

    Data sheet

    Certification included
    true

    To request more information, you can contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    Online courses are accessible 24/7/365 and self-paced, allowing you to progress at your own pace on your own schedule. They can be taken from anywhere in the world from the comfort of your own home. Classroom courses have a set schedule of the days and times the courses will be held, and you must attend during those specific times.

    Find out if online learning is right for you by contacting our team of registration advisers. Our team is available to answer any of your questions about taking an online course before you commit to enrolling. We will walk you through what to expect to ensure you are making the right decision. You can contact a registration adviser today via online chat, our website contact form, or toll free at 1-855-201-6910.

    No, you are not required to have a diploma or higher education degree to enroll in an online course. However, some occupations may require minimum educational thresholds for employment or certification. For more information on your desired career requirements, please contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    To take an online course, you will need to have access to an internet connection and an internet ready device such as a laptop, PC, or tablet. For course specific requirements, please visit the course page or contact a registration adviser today.

    Our courses are developed with multiple formats including text, audio, video, and interactivity. Our courses also include multiple resources and tools which can include flashcards, games, activities, and more.

    No, you can take the online courses from anywhere in the world.

    We participate in several financial assistance options including third party funding, both military and non-military. To request more information on the financial assistance options available and check your eligibility, contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

    Duration is the amount of time you will receive access to your course. Durations vary by course and range between 1 month and 12 months. If you complete your course before your duration ends you will continue to have access to your course until the duration period ends.

    Many of our career training programs include certification vouchers. This means that at the successful completion of your course, at no additional charge, you will receive an exam voucher for the corresponding industry certification. This voucher will allow you to register and sit for the appropriate certification exam to obtain your industry credential.

    Our online courses are open enrollment, so you can start immediately. If you are using any third-party funding to cover your course tuition, your start date may be a future date determined by your funding program.

    Once enrolled, you will be assigned a client adviser who will provide you with customer and technical support. Your client adviser will supply you with your course access information, any needed materials, and be available to answer any questions you have during your training experience. They will regularly check-in with you to monitor your progress and assist you with staying on track. You will also be assigned to a course mentor who will provide curriculum support throughout your training. Your mentor is available to answer any questions you have on your course curriculum, will monitor your progress and understanding of the curriculum, and may give assignments or quizzes.

    If you experience any trouble accessing your course including technical issues or lost login credentials, please contact your client adviser at helpdesk@worldeducation.net.

    We strive to provide a fully online experience for students however some of our training courses include physical materials or equipment. Courses that have materials shipped directly to students will be shipped within 7 business days of registration. Some training courses have material for different sections and these courses may require multiple shipments as you completed stages of your course.

    Our goal for students is to successfully complete their training course and achieve their career goals. We understand that extenuating circumstances can interfere with your ability to complete your course in the duration given. Because of this we have free or low-cost extensions available for our courses upon request. To discuss or request an extension please contact your client adviser at helpdesk@worldeducation.net.

    Upon successful completion of your course and fulfillment of any outstanding financial obligations, you will receive your certificate of completion. Certificates are provided to you within 30 days of completion. Your certificate will validate the training course you completed with a stamp of completion.

    Students that successfully complete our career training programs are assigned a career development adviser who will coordinate placement at a local externship or hands on opportunity. These opportunities are optional and may vary based on availability and occupation. Your career development adviser will also provide job search services such as: resume building, mock interviews, job opportunity resources, and more. Our professional enrichment courses do not come with a career adviser or career services.

    Website Short Description

    With the increase in cyber attacks, Cyber Security has become a thriving career path. Trained security professionals are in high demand and with our complete training program students will be prepared to pursue a career in this exciting industry. This program provides a comprehensive, trustworthy framework of practices for assuring information security. Students will learn how the various roles and functions within Cyber Security practice can be combined and leveraged to produce a secure organization. Concepts will not be presented as stagnant theory; instead, they are interwoven in a real world "adventure" story that runs throughout. This approach grabs students’ attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. With the onset of terrorism and heightened threats both at home and abroad, Homeland Security is a growing, increasingly complex field within the Criminal Justice field. This class is designed to prepare successful students to work in various Homeland Security agencies at a local, state or federal level. Specifically for those students whose career-focus is in counter-terrorism, counter-intelligence, national security or government security, this introductory course is a great way to examine new and different subject areas within this growing field. Corporations are seeking certified, experienced information security professionals to safeguard their information and assets.

    Duration

    12 months

    Language

    English

    Instructor Description

    Though this program is a self-paced program it is supported by an educational mentor. Educational mentors are subject matter experts who have years of experience in their field as well as the necessary educational training and credentials to work as an expert. The mentor is available to answer any questions a learner may have including questions on course content, course material, certifications, and even industry questions. Mentors also monitor the progress of learners to ensure training retention and program advancement. In eLearning, motivation is a key tool to success. Because of this, mentors provide encouraging comments, feedback, and coaching to motivate learners throughout the duration of the program to support completion and success!

    Required Materials

    All required reference materials are provided with this program. Technical requirements:

    Internet Connection
    • Broadband or High-Speed (DSL, Cable, Wireless)
    Hardware Requirements
    • Processor - 2GHz Processor or Higher
    • Memory - 1 GB RAM Minimum Recommended

    Software Requirements
    • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher
    • Microsoft Office 2007, 2010 or 2013 or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx)
    • Internet Browsers - Google Chrome is highly recommended
    • Cookies MUST be enabled
    • Pop-ups MUST be allowed (Pop-up Blocker disabled)
    • Adobe PDF Reader

    Syllabus

    CompTIA Security+ Module 1 - Risk, Monitoring, and Diagnosing Networks • Risk Related Concepts • Control Types • False Positives and Negatives • Risk Management • Implementing Policies • Understanding Control Types • Alarms • Alerts • Trends • Security Posture CompTIA Security+ Module 2 - Devices, Infrastructure, and Access Control • Mastering TCP/IP • OSI Resilience • Working with TCP/IP Suite • IPv4 and IPv5 • Encapsulation • Protocols and Services • Securing Workstations • Access Control Basics • Identity Management • Network Access Control CompTIA Security+ Module 3 - Protecting the Wireless Networks and Securing the Cloud • Wireless Systems • Lightweight Extensible Authentication Protocol • Wireless Attacks • Access Points • Classifying Information • Private Cloud • Security and the Cloud • Host Availability • Sandboxing • Cloud Storage CompTIA Security+ Module 4 - Host, Data, Cryptography and Application Security • Application Hardening • Fuzzing • Secure Coding • Host Security • Database Technologies • Cryptography Overview • Modern Cryptography • Rainbow Tables and Salt • Key Stretching • Wi-Fi Encryption CompTIA Security+ Module 5 - Malware, Vulnerabilities, Social Engineering and Threats • Understanding Malware • Surviving Viruses • Types of Viruses • Spoofing Attacks • Understanding Social Engineering • Types of Social Engineering Attacks • What Motivates an Attack? • The Principles Behind Social Engineering • Social Engineering Attack Examples • Understanding Physical Security CompTIA Security+ Module 6 - Security Administration and Disaster Recovery • Understanding Physical Security • Third-Party Integration • Transitioning • Understanding Business Continuity • Impact Analysis • The Health Insurance Portability and Accountability Act • The Gramm-Leach-Bliley Act • The Computer Fraud and Abuse Act • Penetration Testing • Vulnerability Scanning Homeland Security Specialist Module 1 - What is Homeland Security • Describe how national security policy was viewed and reported prior to 9/11 • Compare approaches to national security before and after the 9/11 attacks • Examine the circumstances leading to the creation of the Department of Homeland Security (DHS) • Describe the Patriot Act and its impact on national security policy • List the six critical mission areas of the National Strategy for Homeland Security (NSHS) • State the mission of the DHS • Describe how the DHS relates to the three branches of government • List the agencies brought under the umbrella of the Department of Homeland Security • Identify the five directorates and their responsibilities • Identify the relationship between homeland security and national security functions Homeland Security Specialist Module 2 - Terrorism • Describe common definitions of terrorism • Describe the historical perspective of terrorism • Identify common components associated with terrorism • List the types and tactics of terrorism • Describe the difference between antiterrorism efforts and counterterrorism tactics Homeland Security Specialist Module 3 - Intelligence • Differentiate between intelligence and information • Differentiate between strategic, operational, and tactical intelligence • Compare how the law enforcement community and the intelligence community define and use intelligence • Describe the purpose and steps of the intelligence cycle • Describe the types and phases of intelligence briefings • Analyze intelligence for reporting in an intelligence brief Homeland Security Specialist Module 4 - Critical Infrastructure • Define the terms critical infrastructure and key resources • Explain the relationship between the public and private sectors in the context of homeland security • Describe behavioral profiling • Describe the applications of proactive terror threat assessment • Describe critical infrastructure and key resources from a U.S. historical perspective • Describe the rationale for post-incident investigations Homeland Security Specialist Module 5 - Cyber Terrorism • Describe ways in which cyber terrorists use technology • Discuss the negative consequences of cyber terrorism • Identify the tools used by cyber terrorists • Describe the difference between cyber crime and cyber terrorism • Examine measures to identify and remedy cyber vulnerabilities Homeland Security Specialist Module 6 - Transportation • Identify the principle federal agencies involved in providing security for transportation systems • Describe the principle hazards and vulnerabilities faced by the various modes of transportation • Identify the local, national, and international interconnections among various modes of mass transportation • Research the initiatives being implemented to improve security for transportation systems in the United States Homeland Security Specialist Module 7 - Public Health • Define the term pandemic • Identify historical examples of flu pandemics • Describe the role of vaccines during a pandemic • Examine the use of biological agents as weapons • Differentiate among the categories of biological priority agents • Examine the role of the Centers for Disease Control and Prevention (CDC) • Describe future goals for federal public health preparedness Homeland Security Specialist Module 8 - National Response Framework (NRF) • Describe the difference among catastrophic events, emergencies, and disasters • Identify how catastrophic events are measured • Describe how human encroachment upon the natural environment has affected human exposure to natural hazards • Describe the difference between technological disasters and natural disasters • Describe the impact terrorism has had on the types of threats that emergency managers must confront • Explain the factors that have contributed to an increasing salience of emergency management in American society Homeland Security Specialist Module 9 - Emergency Management • Describe the history of the federal emergency management organizations in the United States • Identify pre-impact conditions and various physical and social vulnerabilities • Define the elements of a response protocol Homeland Security Specialist Module 10 - Incident Command System (ICS) • Define Incident Command System (ICS) • Explain the rationale for the ICS and the benefits it provides • Describe the purpose of the Standardized Emergency Management System (SEMS) • Identify the role of the Incident Commander (IC) • Describe the importance of comprehensive resource management Homeland Security Specialist Module 11 - All Hazards Approach • Identify the role of the National Disaster Medical System (NDMS) in disaster management • Identify areas in which the NYPD's response to the 9/11 attacks indicated good prior planning or showed the need for more thorough planning • Describe the purpose and function of the National Incident Management System (NIMS) • Describe the all-hazards approach to emergency management • Describe how multiple responding agencies are coordinated Homeland Security Specialist Module 12 - ICS Roles and Procedures • Identify the organizational structure for an Incident Command System (ICS) disaster response • Identify the purpose of an Incident Action Plan (IAP) • Describe the difference between the National Incident Management System (NIMS) and the ICS • Write an emergency plan and response Homeland Security Specialist Module 13 - Ethics • Describe the philosophical perspective on ethics • Discuss the practice of torture by proxy • Identify the leadership selection process in the war on terror • Explain norms in relation to ethical considerations • Describe the issue of looting after a disaster Homeland Security Specialist Module 14 - Emergency Communications • Identify the common and alternative systems and technologies used in emergencies • Discuss the lessons learned from past communications mistakes • Describe the evolution of communications technology in the context of incident response • Describe how technology can be used for emergency planning, participation, and response • Write a response plan to a hypothetical emergency situation Homeland Security Specialist Module 15 - Careers and the Role of Education • Examine security protection and incident response for medical facilities • Examine security protection and incident response for businesses • Examine security protection and incident response for public utility workers • Examine security protection and incident response for emergency responders • Examine security protection and incident response for social service providers • Describe the role of education in homeland security Certified Information Systems Security Professional (CISSP) Module 1 - Access Control • Identification and Authentication Techniques • Access Control Techniques • Authorization Mechanisms • Access Control Attacks and Monitoring Authentication • Risk Elements • Preventing Access Control Attacks • Smart Cards • Biometrics • Security Operations Principals • Role-Based Access Controls • Centralized versus Decentralized Access Control • Assessing Effectiveness of Access Controls Certified Information Systems Security Professional (CISSP) Module 2 - Network Security • Secure Network Architecture and Securing Network Components • OSI Model • Secure Network Components • Cabling, Wireless, Topography and Communications Technology • System and Security Management • Secure Communications and Network Attacks • Network and Protocol Security • Virtual Private Network • Firewall Terms and Types • Web Security • Common Attacks • Remote Access Security Certified Information Systems Security Professional (CISSP) Module 3 - Information Security Governance and Risk Management • Security Governance Concepts, Principles, and Policies • Layering • Data Hiding • Control Frameworks • Security Management • Risk Management • Terminology • Qualitative/Quantitative Risk Analysis • Manage Personnel Security • Security Education and Training • Information Classification • Employment Policies • Change Management Certified Information Systems Security Professional (CISSP) Module 4 -Software Development and Malicious Applications • Application Issues • Databases and Data Warehousing • Data Information Storage • Knowledge Based Systems • System Development and Controls • Malicious Code and Application Attacks • Password Attacks • Applications Beyond the Database • Web Application Security • IP Probes • IP Spoofing • Vulnerabilities Certified Information Systems Security Professional (CISSP) Module 5 - Cryptography • Cryptography and Symmetric Key Algorithms • PKI and Cryptographic Applications • Cryptography Basics • Cryptanalysis Terms • Symmetric Encryption • Asymmetric Cryptography • Modern Cryptography • Public Key Infrastructures • Hash Functions • Digital Signatures • Protocol Based • Pretty Good Privacy • Cracking Techniques Certified Information Systems Security Professional (CISSP) Module 6 - Security Architecture and Design • Principles of Security Models, Design, and Capabilities • Security Architecture Vulnerabilities, Threats, and Countermeasures • Security Operations • Fundamentals of Security • Clark-Wilson Model • Objects and Subjects • Computer Architecture • Singe Points of Failure • Information Security Architecture • Common Security Issues • Security Operations • Resource Protection • Change and Configuration Management Certified Information Systems Security Professional (CISSP) Module 7 -Incident Management, Business Continuity and Disaster Recovery • Manage Incident Response • Preventative Measures • System Resilience • Reasons for Business Continuity Plans • Business Continuity Life Cycle • Project Scope and Planning • Business Impact Assessment • BCP Documentation • Nature of Disaster • Recovery Strategies • Data Redundancy • System Backups • Testing and Maintenance Certified Information Systems Security Professional (CISSP) Module 8 - Legal Requirements, Incidents and Ethics • Categories of Law • Compliance • Contracting and Procurement • Code of Ethics • Computer Crimes • Import/Export • Privacy • Major Categories of Computer Crimes • Incident Handling • Liability • Response Teams • Accessibility and Perimeter Security • Natural Disasters • Work Area • Internal Security • Boundary Protection • Course Summary

    Requirements

    Prerequisites

    We recommend candidates possess CompTIA Network+ certification and two years of technical networking experience, with an emphasis on security.

    Technical Requirements

    All required reference materials are provided with this program. Technical requirements: Internet Connection • Broadband or High-Speed (DSL, Cable, Wireless) Hardware Requirements • Processor - 2GHz Processor or Higher • Memory - 1 GB RAM Minimum Recommended Software Requirements • Operating Systems - Windows 7, 8 or 10; Mac OS x 10 or higher • Microsoft Office 2007, 2010 or 2013 or a Word Processing application to save and open Microsoft Office formats (.doc, .docx, .xls, .xlsx, .ppt, .pptx) • Internet Browsers - Google Chrome is highly recommended • Cookies MUST be enabled • Pop-ups MUST be allowed (Pop-up Blocker disabled) • Adobe PDF Reader

    Certification

    CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career. CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability. Each state may have additional licensing requirements, be sure to research your states requirements for employment by visiting your states occupation board.

    Write your review

    The following email wasn't used for buying this product