Course Name |
Hours |
List Price |
Content |
Cyber Secure Coder (CSC) |
21.00 |
$1,497.00 |
|
Description: This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.
# of Days:
Setting:
|
CyberSAFE |
4.00 |
$199.00 |
|
Description: In this course, you will cover what you can do to protect yourself and your organization from technology-related risks. This course will help you to:
Understand both security and compliance needs and requirements.
Recognize and avoid phishing and other social engineering attempts.
Recognize and avoid viruses, ransomware, and other malware.
Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.
In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.
# of Days:
Setting:
|
CyberSec First Responder (CFR) |
35.00 |
$2,495.00 |
|
Description: This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERTs National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organizations security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.
# of Days:
Setting:
|
IRBIZ: Incident Response for Business Professionals |
7.00 |
$349.00 |
|
Description: This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERTs NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response.
# of Days:
Setting:
|
C)HISSP: Healthcare IS Security Professional |
28.00 |
$3,500.00 |
|
Description: In this course, you will cover the skills and knowledge to implement the best IT healthcare practices, as well as regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity.
|
C)ISMS-LA: Certified ISMS Lead Auditor |
21.00 |
$3,000.00 |
|
Description: In this course, you will be prepared to conduct audits of information security management systems (ISMS) to ensure that they meet ISO/IEC 27001 standards in any organization.
ISMS ISO/IEC 27001 Audit Methodology:
Planning
Control Evaluation
Substantive Testing
Completion
The C)ISMS-LA is perfect for those looking to perform an internal or external ISMS 1S0/IEC 27001 audit.
|
C)ISMS-LI: Certified ISMS Lead Implementer |
21.00 |
$3,000.00 |
|
Description: In this course, you will be prepared to conduct audits of information security management systems (ISMS) to ensure that they meet ISO/IEC 27001 standards in any organization.
ISMS ISO/IEC 27001 Audit Methodology:
Planning
Control Evaluation
Substantive Testing
Completion
The C)ISMS-LI is perfect for those looking to implement a ISMS 1S0/IEC 27001 system.
|
SSCP Certification Prep Course |
35.00 |
$3,895.00 |
|
Description: The best way to combat an attack on an organizations information assets is to have qualified information security professionals with the appropriate practices and controls to implement, monitor and administer IT infrastructure to ensure data confidentiality, integrity and availability. This official SSCP course validates students ability to identify, evaluate, and prioritize potential threats, manage and mitigate threats through risk management concepts, assessment activities, and monitoring terminology, techniques and systems.
Gain skills to properly and promptly respond to a security incident or forensic investigation with incident handling processes and procedures such as Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP).
|