Certificate in Cybersecurity

« previous course next course »

Certificate in Cybersecurity Banner

This Certificate in Cybersecurity offers lessons on the critical elements of information security, as well as foundational information about key certifications for professionals in the industry.

Enroll Now* Wish List Course PDF

*For Individual course enrollment, go to the Bundle Courses section below.

Bundle Description

Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft, and destruction. Failures of cybersecurity policies, both in large corporations and governmental agencies, have earned significant visibility and negative publicity in recent months and years. As the amount of data being stored continues to increase, and as hackers become more sophisticated, the need for cybersecurity is greater than ever.

This Certificate in Cybersecurity offers lessons on the critical elements of information security, as well as foundational information about key certifications for professionals in the industry. Each of the eight courses in this suite will help learners master the vocabulary of the industry and offer examples, videos, interactive games, and review questions to ensure mastery of the material.

Courses can be taken in any order. Upon successful completion, you can download and print a Certificate of Completion.

In this 8-module certificate program, you must complete all 8 modules to obtain the certificate.

* Please note: the individual modules can be taken separately but you will not receive the certificate.

More Info

 

Bundle Information


    Suite Price: $499.00

    Estimated length: 40 hours

    PDUs/Contact Hours: 40 | CEUs: 4

    Access Time: 365 Days


Bundle Courses


Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel down to front line employees. Various security controls will be described that help protects privacy, along with data leakage prevention (DLP). Although it is not necessary, having some foundation in IT concepts is helpful in taking this course.

The content in this course aligns with Domain Two in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Learning Outcomes:

• Understand the role of asset security and discuss its key themes

• Discuss the information life cycle and explain how information and data are classified

• Compare the various titles and roles of those involved with information security within an organization

• Learn about data and information privacy and how to protect privacy

• Compare different data retention and destruction methods

• Explain several methods for countering data leakage


Course Price: $79

Estimated Length: 5 Hours

PDUs/Contact Hours: 5 | CEUs: .5

Access Time: 90 Days

Enroll Now
 
 

This course covers topics related to communications and network security. It begins with a lesson in the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners who are interested in gaining an introduction to information technology security.

The content in this course aligns with Domain Four in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Learning Outcomes:

• Discuss the general concepts that enable networking and its role in information technology

• Compare the different types of networks, including LANs, WANs, and MANs, as well as the Internet, intranets, and extranets

• Explain what the Open Systems Interconnection (OSI) Reference Model is and identify its seven layers

• Contrast the OSI model with the TCP/IP Model

• Identify common protocols and differentiate between network, routing, and data link protocols

• Describe the functions of common networking devices, including bridges, routers, hubs, repeaters, switches, and firewalls

• Discuss how wireless networks work and the technology that enables them

• Identify common network attacks and how they can be prevented


Course Price: $79

Estimated Length: 3 Hours

PDUs/Contact Hours: 3 | CEUs: .3

Access Time: 90 Days

Enroll Now
 
 

This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other. This course requires some basic understanding of IT concepts.

The content in this course aligns with Domain Five in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Learning Outcomes:

• Understand the key principles and terminology of information access control

• Discuss different types of identification and authorization techniques

• Describe common access control models and mechanisms

• Identify common access control attacks and countermeasures


Course Price: $79.00

Estimated Length: 5 Hours

PDUs/Contact Hours: 5 | CEUs: .5

Access Time: 90 Days

Enroll Now
 
 

This course covers the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process of providing information security training and education. This course requires some basic understanding of IT concepts.

The content in this course aligns with Domain One in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Learning Outcomes:

• Discuss the concept of security governance and understand the job of overseeing data security

• Describe the role of policy and procedure documents in information security

• Understand the key principles and terminology of information security governance and risk management

• Discuss different management practices for overseeing an effective information security function

• Identify common information security risks and threats

• Describe the process for conducting a risk assessment

• Understand the data classification process and properly classify data according to security needs

• Explain the process for providing information security training and education


Course Price: $79

Estimated Length: 5 Hours

PDUs/Contact Hours: 5 | CEUs: .5

Access Time: 90 Days

Enroll Now
 
 

This course covers security assessment and testing, focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Students will have the opportunity to practice how to assess the impact of disasters that may arise as well as to develop their own versions of these plans. This course requires a basic understanding of IT concepts.

Learning Outcomes:

• Relate the many potential disasters and disruptions that can impact organizations and their information systems

• Describe the steps required in conducting a business impact assessment

• Explain the difference between a business continuity plan and a disaster recovery plan*

• Discuss different recovery strategies and how they fit into disaster recovery planning

• Understand the business continuity organization and its responsibilities

• Prepare business continuity and disaster recovery plan

• Discuss how organizations test their BCPs and DRPs, and perform different exercises to prepare for disruptions


Course Price: $79

Estimated Length: 5 Hours

PDUs/Contact Hours: 5 | CEUs: .5

Access Time: 90 Days

Enroll Now
 
 

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management are also covered. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Three in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Learning Outcomes:

• Understand how cryptography works and its role in information security

• Compare and contrast different ciphers and explain how they work

• Create substitution ciphers and encode and decode cleartext and ciphertext

• Discuss how encryption enables secure transmission of sensitive data

• Explain and compare symmetric and asymmetric cryptography

• Describe the role of public key infrastructure and key management


Course Price: $79

Estimated Length: 5 Hours

PDUs/Contact Hours: 5 | CEUs: .5

Access Time: 90 Days

Enroll Now
 
 

This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring, and detection in information security. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Seven in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Learning Outcomes:

• Understand the role of security operations and discuss its key themes

• Discuss several administrative controls and explain how they can improve information security*

• Compare different security controls and explain how they work

• Identify trusted recovery techniques

• Relate the steps required in effective incident management and response

• Discuss the role of auditing, monitoring, and detection in information security

• Describe the steps involved in a digital forensics investigation


Course Price: $79

Estimated Length: 5 Hours

PDUs/Contact Hours: 5 | CEUs: .5

Access Time: 90 Days

Enroll Now
 
 

This course covers software development security while focusing on the systems development life cycle, operating systems, and their environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. Students will have the opportunity to apply application security controls. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Eight in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Learning Outcomes:

• Discuss the role of security in software development

• Explain the systems development life cycle and compare its eight stages

• Understand what the operating system is and how it works

• Describe the different application and operating environments

• Discuss the role of databases in information security and identify different database types

• Apply several application security controls

• Recognize several software-based attacks and describe methods to guard against them


Course Price: $79

Estimated Length: 5 Hours

PDUs/Contact Hours: 5 | CEUs: .5

Access Time: 90 Days

Enroll Now
 
 

Bundle Details


★ Expert Supported

★ Accessible

★ Games & Flashcards

★ Real-world case studies


 

★ Mobile-friendly

★ Badge and credit-awarding

★ Video content

★ Audio-enabled in-app

 
 

This course is perfect for information technology, cybersecurity, and security professionals seeking to develop strong cybersecurity foundations in an effort to protect their networks and IT infrastructure.

 
 

No Prerequisites.

 
 

This course does not require any additional purchases of supplementary materials.

 

This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.

 

Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEU credit. Learners will have three attempts at all graded assessments.

 

Contact Us

UTRGV Continuing Education

McAllen Teaching Site:
1800 S. Main Street
Suite 1100 McAllen, TX 78503

 

Phone: (956) 665-2071

 


Brownsville Campus:
One West University Boulevard, BMAIN 1.210K
Brownsville, Texas 78520

 

Phone: (956) 882-7711