print
Course Name
IT Cyber Security Certificate Series

Contact Hours: 100

Course Description

IT Security is considered by many to be the fastest growing and most lucrative sector in the IT market. With today's leading companies putting an ever growing importance on the security of their infrastructure, IT Security pros are capitalizing on acquiring high salary positions to protect these businesses systems.  The IT Security Certificate series combines 3 of the most valued certifications in the IT Security arena. Advance your career with 3 certifications that command over $100,000 per year salaries in this rapidly growing area of Information Technology.

 

Courses in the Series:  

 

CISA Certified Information Systems Auditor

CISSP Certified Information Systems Security Pro

CISM Certified Information Security Manager

 

CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.  CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice (identified below) was effective beginning with the June 2011 CISA exam administration.

Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you’ll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.

The Certified Information Security Manager (CISM) certification program was developed by ISACA to start or develop individuals careers as security managers. Once certified the CISM qualifies students to design, manage, asses and oversee an enterprise’s information security infrastructure.  IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace. This Technology Institute course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.


Outcome

Upon successful completion, the CISSP course provides you with the knowledge and skills to pass the CISSP certification exam, after which you will have the ability to manage, operate, develop and plan an effective network security infrastructure.


Assessment

Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.

Quizzes & Exam Simulators - The custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.  This will allow you to gauge your effectiveness before moving to the next module in your course. These courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

Prerequisites - 3 years of IS audit, control, assurance or security experience or, 2 years of IS audit, control assurance or security experience and 1 full year non-IS audit or IS experience


Outline
To receive a complete and comprehensive course outline write to courseinfo@jeronline.com and include the complete course title.

Internet Connectivity Requirements:
Cable and DSL internet connections are recommended. Hardware Requirements: Minimum Pentium 400 Mhz CPU or G3 Macintosh. 1 GHz or greater CPU recommended. 256MB RAM minimum. 1 GB RAM recommended. 800x600 video resolution minimum. 1025x768 recommended. Speakers/Headphones to listen to Dialogue steaming audio sessions. A microphone to speak in Dialogue streaming audio sessions. Operating System Requirements: Windows Vista, 7, 8, 8.1 Mac OSX 10 or higher. OpenSUSE Linux 9.2 or higher. Web Browser Requirements: Google Chrome is recommended. Firefox 13.x or greater. Internet Explorer 6.x or greater. Safari 3.2.2 or greater. Software Requirements: Adobe Flash Player 6 or greater. Oracle Java 7 or greater. Adobe Reader 7 or greater. Web Browser Settings: Accept Cookies. Disable Pop-up Blocker.