Real-World Cybersecurity Scenarios
Real-World Cybersecurity Scenarios
Regular price
$1,245 USD
Regular price
Sale price
$1,245 USD
Unit price
per
Cyber realm riddles? Fear not! Dive into real-world whodunnits and decode the digital domain's dangers. From firewalls to phishing, be the cyber-sleuth the world needs. Dive in, detective!
Course Duration:30 hours
Credits:
CEU Credits: 3
AMA PCM CEU Credits: 0
PDU Credits: 30
HRCI Credits: 30
SHRM Credits: 25
CFRE Credits: 0
ATD CI Credits: 0
ACE Credits: 0
This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Cryptography Scenarios
This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Compliance and Operational Security Scenarios
This course contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. This course also features a number of fictional scenarios based on compliance and operational security to allow you to practice the concepts learned in the material. This course requires some basic understanding of IT concepts.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Threats and Vulnerabilities Scenarios
This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real-world scenarios.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Application, Data, and Host Security Scenarios
When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 0
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 0
Access Control and Identity Management Scenarios
Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs
Course Description
What would you do in the face of an actual information security problem? These courses each include a module devoted to fictional scenarios, based on real-world challenges that cybersecurity professionals face. Each course is self-paced and contains interactive games, real-world examples, expert videos, quizzes, assessments, and focused instruction. Each of the courses in this bundle helps refine and enhance the skills that cybersecurity and IT professionals need. The concepts and principles covered focus attention on the needs of the expanding computer information security industry. This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful. Individual courses included in this bundle are listed below.
Individual courses offered in this certificate program are listed below.
Testimonials
Reda B.
The module is beneficial and the scenario offered help to develop the reflexes of network security.
Sidney P.
This class was organized, the information was current, and it was very informative.