Skip to product information
1 of 1

MindEdge

Real-World Cybersecurity Scenarios

Real-World Cybersecurity Scenarios

Regular price $1,245 USD
Regular price Sale price $1,245 USD
Sale Sold out

Cyber realm riddles? Fear not! Dive into real-world whodunnits and decode the digital domain's dangers. From firewalls to phishing, be the cyber-sleuth the world needs. Dive in, detective!

Course Duration:30 hours

Credits:
CEU Credits: 3
AMA PCM CEU Credits: 0
PDU Credits: 30
HRCI Credits: 30
SHRM Credits: 25
CFRE Credits: 0
ATD CI Credits: 0
ACE Credits: 0


This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs

This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs

Cryptography Scenarios

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs

Compliance and Operational Security Scenarios

This course contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. This course also features a number of fictional scenarios based on compliance and operational security to allow you to practice the concepts learned in the material. This course requires some basic understanding of IT concepts.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs

Threats and Vulnerabilities Scenarios

This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real-world scenarios.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs

Application, Data, and Host Security Scenarios

When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 0

Access Control and Identity Management Scenarios

Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.
Credits:
0.5 CEUs 5
ATD CI Credits 5
PDUs 5
HRCIs 05 SHRMs

Course Description

What would you do in the face of an actual information security problem? These courses each include a module devoted to fictional scenarios, based on real-world challenges that cybersecurity professionals face. Each course is self-paced and contains interactive games, real-world examples, expert videos, quizzes, assessments, and focused instruction. Each of the courses in this bundle helps refine and enhance the skills that cybersecurity and IT professionals need. The concepts and principles covered focus attention on the needs of the expanding computer information security industry. This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful. Individual courses included in this bundle are listed below. Individual courses offered in this certificate program are listed below.

Testimonials

Reda B.

The module is beneficial and the scenario offered help to develop the reflexes of network security.

Sidney P.

This class was organized, the information was current, and it was very informative.

View full details

Course Description

Included Courses

Testimonials