Texas State University:  Online Course Catalog    -    Phone: 512-245-2507 / 800-511-8656

IT Cyber Security Certificate Series
IT Security is considered by many to be the fastest growing and most lucrative sector in the IT market. With today's leading companies putting an ever growing importance on the security of their infrastructure, IT Security pros are capitalizing on acquiring high salary positions to protect these businesses systems.  The IT Security Certificate series combines 3 of the most valued certifications in the IT Security arena. Advance your career with 3 certifications that command over $100,000 per year salaries in this rapidly growing area of Information Technology. 1 year access from start of course. Program may

Click Add to Cart for Purchase
Cyber Security & Forensics Certificate Series
Computer and network systems across the globe are systematically being attacked by rampant hacking. Hacking is now a wide spread practice, leaving companies at all levels vulnerable. In order to stop hackers from completing their goals, you must first think like a hacker. As the old moniker goes; you must think like a thief to catch a thief. Students will gain an understanding of how defense functions work and then continue into scanning and attacking networks. The theory of this course bundle is to gain the skills to think like the black hat hackers do and then apply the information to structure preventative measures through penetration testing

Click Add to Cart for Purchase
Complete End-user Cyber Security Training
This two course series includes Cyber Security Awareness & Prevention and Data Security Compliance. The Cyber Security Awareness and Prevention course will teach you how to keep your network safe, how to stay safe on the internet, how to keep your email safe, how to use anti-virus software and much more. The Data Security Compliance course outlines important data security measures to be taken by individuals to protect sensitive data and PI. This course of study can be fast-tracked and completed sooner than the alloted time.  

Click Add to Cart for Purchase
Certified Information Systems Security Pro (CISSP) 2015
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new

Click Add to Cart for Purchase
Cisco 210-260: CCNA Security
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This course with 11 chapters emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure. Topics for the course include Secure Access, Cisco ASA, Firewalls, IPS/IDS, VPNs and Secure Routing and Sw

Click Add to Cart for Purchase
Computer Hacking Forensic Investigator (CHFI)
CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. Please note: Course of study may be completed earlier than indicated and students retain access for one year from date of enrollment.

Click Add to Cart for Purchase
Certified Information Systems Auditor (CISA)
CISA is to Audit what CPA and CA are to Accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the CISA exam administration in June 2011. For purposes of these statements, the terms "enterprise" and "organization" or "organizational" are considered synonymous. Please

Click Add to Cart for Purchase
Certified Information Security Manager (CISM)
IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace. This course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO. Please note: Course of study may be completed earlier than indicated and students retain access for one year from date of enrollment.

Click Add to Cart for Purchase
CompTIA Complete Cybersecurity Career Pathway Bundle with Labs
With the increase in cyberattacks and the number of new connected devices, the need for skilled cybersecurity professionals is growing at a rapid pace. In fact, the U.S. Bureau of Labor Statistics predicts that the number of information security jobs will increase 18 percent from 2014 to 2024, making it one of the fastest-growing fields. Employers, from government to Fortune 500 companies, value CompTIA as an authority in cybersecurity certifications. Courses in this series: CompTIA FC0-U51: IT Fundamentals CompTIA 220-901& 902: CompTIA A+ CompTIA N10-006: CompTIA Network+ CompTIA SY0-501: Security+ CompTIA Cybersecurity Analyst (CSA+) CompTIA CAS-001: Advanced Security Practitio

Click Add to Cart for Purchase
CompTIA Security+ SY0-501
The CompTIA Security+ course is designed to teach students security basics and prepare them for testing to become Security+ certified. The Security+ covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access management, risk assessment and management, and finishes up with Cryptography and Public Key Infrastructure. This covers everything from the ever-expanding virtualization of various computing systems to industry management of smart devices. Please note: Course of study may be completed earlier than indicated and students retain access for one year from the date of enrollment.

Click Add to Cart for Purchase
CompTIA Cybersecurity Analyst (CSA+)
The CompTIA Cybersecurity Analyst, or CSA+, is a CompTIA certification focusing on the knowledge and skills required to configure and use threat-detection tools, perform data analysis, and interpreting the results with the end goal of securing an organization’s applications and systems. The CSA+ is a vendor neutral certification that expects three to four years of experience in a related field as well as a Security+ or equivalent knowledge. In this regard, the CSA+ lies between the security+ as well as the CompTIA Advanced Security Practitioner (CASP) exams and is an excellent go between to tackle before diving into the CASP, but when the Security+ isn’t enough. With the ongoing requirement for government agencies to receive certifications,

Click Add to Cart for Purchase
Certified Ethical Hacker (CEH)
The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Ov

Click Add to Cart for Purchase
Press F5 if a menu item above does not display
     More courses found here
Field of Study 
Subject  (Optional)
      Keyword or Course#
Contact Information

Texas State University
601 University Dr.
San Marcos,  TX  78666

Voice:  512-245-2507 / 800-511-8656
Fax:  512-245-8934
Website:  www.studyanywhere.txstate.edu
Email:  continuinged@txstate.edu


Copyright © JER Online (JER Group Inc.)   All Rights Reserved
Azure Web