Certificate in Information Security Management

Villanova University

How long?

  • online
  • on demand

Villanova University

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Reviews

Make sure this course is right for you.

Get unbiased reviews and personalized recommendations.

Who should attend

This security program is ideal for business professionals who must combat potential cyber-threats and attacks that endanger their organizations' data.

About the course

Hackers and cyberterrorists have pushed corporations to new levels of alert, creating the need for heightened IT security measures to protect both infrastructure and data.

Villanova University’s 100% online Certificate in Information Security Management provides students with foundational knowledge of cybersecurity terminology, cloud computing best practices, the management and identity of network access, and infrastructure, operational and transmission security. In addition, required course curriculum can help prepare you for the CompTIA Security+ certification exam, while providing you with valuable insight into the latest information security techniques and technology used by industry experts.

The Certificate in Information Security Management can be earned by completing two required courses and one elective. This certificate focuses on the entry-level IT security certification of professionals with networking and security experience.

What You’ll Learn

Learn proven techniques for assessing security risks and safeguarding corporate data including the theorical and applied aspects of IS and IT security. Earn the qualifications to meet government requirements, advance your career potential or transition into a qualified information security role.

Required Courses

Essentials of IS Security

As a cybersecurity professional, you know that hackers and cyberterrorists have pushed corporations to new levels of alert these days, creating the need for heightened security to protect both infrastructure and data.

And undoubtedly, you also know that increasing your understanding of risk assessments and current cyber trends is an ongoing process. It’s essential to maintain skills to combat threats, prevent attacks, and perform remediation activities.

What You’ll Study

Introduction to Security and Investigation Phase

  • History of Security
  • System Development Life Cycle
  • Security in the Organization
  • The Need for Security
  • Threats, Attacks and Current Issues in IS Security
  • Law and Ethics in Information Systems
  • How Attackers Use Hardware/Software to Sniff Traffic
  • Security at the Network Level

Security Analysis

  • Risk Management
  • Risk Identification
  • Risk Control Strategies
  • Mitigation Selection
  • Risk Categories of Control
  • Other Risk Management Discussion Points
  • Risk Assessment in Real Life
  • Current Issues in IS Security
  • Current Deployment of Crypto Tools

Logical Physical Security Design

  • Information Security Policy, Standards and Procedures
  • System Design, Security Blueprint and Security Models
  • Security Education, Training and Awareness
  • Continuing Strategy and Planning
  • Incident Response, Reaction and Recovery
  • Disaster Recovery and Business Continuity Planning
  • Firewalls & Intrusion Detection Systems
  • Cryptography and Encryption
  • Physical Security and Wireless Insecurity
  • Current Issues in IS Security, Anti-virus and SPAM

Implementation and Maintenance of Security

  • Project Management Phase
  • Technical Topics of Implementation
  • Security Considerations Within an Organization
  • Information Security Maintenance
  • Identity Management Systems
  • Different Certifications: Where Do We Go From Here?

Mastering IS Security+

Policies and technologies need dedicated people who can implement and manage them. Become part of a well-trained workforce that effectively combats hackers, fights attacks and battles other threats.

This in-depth course builds on Essentials of IS Security to expand your knowledge in the cybersecurity field. Topics include communication security, infrastructure security, cloud computing, cryptography, access control, authentication, external attacks, operational and organization security.

What You’ll Study

Introduction to Mastering IS Security+™

  • Course Introduction
  • Security Concepts
  • Risk Management
  • Risk-Based Security
  • Cloud Computing
  • Virtualization
  • Organizational Policies and Controls
  • Network Design Elements
  • OSI Model
  • TCP/IP Review
  • Firewalls and Other Network Security Tools
  • RADIUS and TACACS+
  • SMTP, IMAP and POP
  • Threats to Email
  • Wireshark
  • IDS and IPS Security Applications
  • Incident Response
  • Basic Forensic Procedures
  • IP Protocol
  • Wireless Protocols
  • Wireless Attacks

Security in Transmissions

  • IP Addressing
  • Wireless Site Security
  • IEEE 802.11 Inner Workings
  • Snort
  • Honeypots
  • Digital Evidence
  • Trojans and Backdoors
  • Botnets
  • DDoS
  • System and Vulnerability Scanning
  • Password Attacks
  • Malware and Social Engineering
  • Alphabet Soup of the Internet
  • Password Security
  • Helper Protocols
  • Adware and Spyware
  • Antivirus
  • Passwords and Authentication

Security in the Infrastructure

  • Kerberos
  • Access Control Models
  • Applying Access Control
  • Social Networking
  • Attack Terminology
  • Hardening the Operating System
  • Hardening Applications
  • Application Vulnerabilities
  • Developing Secure Applications
  • General Cryptographic Concepts
  • Hashing
  • Applied Cryptographic Concepts
  • Telnet vs. Secure Shell
  • IP Security
  • VPNs: L2TP and PPTP
  • Securing Email

Operational Security

  • Operational Security Issues
  • Introduction to PKI
  • More PKI and Key Management
  • PKI Certificates
  • Certificate Variations
  • Web Protocols and Encryption
  • Web Vulnerabilities
  • Data Exchange Attacks
  • SSL/TLS, HTTPS, and LDAP
  • Controls
  • Physical Security
  • Environmental Controls
  • Hardening the Network
  • Network Appliances
  • Wireless Vulnerabilities
  • 2.4 GHz Band Wireless
  • Redundancy Planning
  • Disaster Recovery
  • Change Management
  • Logical Control Mechanisms
  • Ten Important Things to Know
  • Course Conclusion

Curriculum

8 Week Course

Introduction to Mastering IS Security+™, Part 1

  • List and explain three types of access control and six authentication mechanisms
  • Identify assets, vulnerabilities, and threats and assess risk mitigation strategies
  • Determine specific risks associated with cloud computing and virtualization
  • Name and describe security policies that facilitate compliance
  • Summarize five basic network classifications and their standard building blocks
  • Diagram the OSI model layers and the TCP/IP stack components

Introduction to Mastering IS Security+™, Part 2

  • Evaluate various types of firewalls and other network security tools
  • Explain how RADIUS, TACACS+ and DIAMETER provide access control
  • Recommend methods for securing SMTP, IMAP, POP and wireless networks
  • Identify threats to email and wireless communications
  • Describe how protocol analyzers and IDS/IPS applications monitor and protect network activity
  • Outline the basic steps involved in incident response and forensic analysis

1 Elective

Essentials of Business Analysis 8 Week Course

Essentials of Business Intelligence 8 Week Course

Essentials of Business Process Management 8 Week Course

Essentials of Project Management 4 Week Course

Learn cybersecurity concepts, methods and practices

You know hackers and cyberterrorists have pushed corporations to new levels of alert, creating the need for heightened IT security measures to protect both infrastructure and data.

Now you can get skills to combat threats, prevent cyber-attacks and remedy unanticipated casualties by earning your Certificate in Information Security Management - 100% online.

The Certificate in Information Security Management can be earned by completing two required courses and one elective. This certificate focuses on the entry-level IT security certification of professionals with networking and security experience.

Certificate in Information Security Management at Villanova University

From  $6,235

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.