Skip to Main content

Cybersecurity

Certificate in Cybersecurity

Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft, and destruction. Failures of cybersecurity policies, both in large corporations and governmental agencies, have earned significant visibility and negative publicity in recent months and years. As the amount of data being stored continues to increase, and as hackers become more sophisticated, the need for cybersecurity is greater than ever.

This Certificate in Cybersecurity offers lessons on the critical elements of information security, as well as foundational information about key certifications for professionals in the industry. Each of the eight courses in this suite will help learners master the vocabulary of the industry and offers examples, videos, interactive games, and review questions to ensure mastery of the material.

Courses can be taken in any order. Upon successful completion, you can download and print a Certificate of Completion.

INFORMATION, REGISTRATION & PAYMENT

Back To Top
Real-World Cybersecurity Scenarios

What would you do in the face of an actual information security problem? These courses each include a module devoted to fictional scenarios, based on real-world challenges that cybersecurity professionals face. Each course is self-paced and contain interactive games, real-world examples, expert videos, quizzes, assessments, and focused instruction.

Each of the courses in this bundle helps refine and enhance the skills that cybersecurity and IT professionals need. The concepts and principles covered focus attention on the needs of the expanding computer information security industry.

This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful.


Information, Registration & Payment

Back To Top
Real-World Cloud Cybersecurity Scenarios

This suite of five related courses covers various aspects of securing cloud services. Its structure is based on the Certified Cloud Security Professional (CCSP) certification administered jointly by the Cloud Security Alliance and (ISC)2. Each course is comprised of two modules. The first provides content related to the course subject matter. The second module engages the learner with real-world scenarios in which he or she must apply the content of the first module.

This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful.

Individual courses included in this bundle are listed below.

Information, Registration & Payment

Back To Top
CISSP® Exam Prep Course

The CISSP® Exam Prep Course prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect.

This course contains two 120-question practice exams, which cover The International Information System Security Certification Consortium's eight domains:

  1. Asset Security
  2. Communications and Network Security
  3. Identity and Access Management
  4. Security and Risk Management
  5. Security Assessment and Testing
  6. Security Engineering
  7. Security Operations
  8. Software Development Security

Information, Registration & Payment

Back To Top
CISSP® Practice Exams and Exam Strategies

This course is designed to give learners an assessment of their readiness to take ISC2's CISSP® Exam. It contains two 120-question practice exams, which cover The International Information System Security Certification Consortium's eight domains:

  1. Security and Risk Management
  2. Asset Security
  3. Security Engineering
  4. Communications and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

Information, Registration & Payment

Back To Top
CompTIA Security+® Exam Prep Course

The CompTIA Security+® Exam Prep Course prepares test-takers for the Security+ exam, as administered by CompTIA. The CompTIA certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024 and is approved by the US Department of Defense to meet directive 8140/8570.01-M requirements. The course contains a variety of content presentation methods to help teach the concepts and vocabulary, and ultimately, learners are given ample opportunity to assess their skills with a multiple choice practice exam.

 

Information, Registration & Payment

Back To Top
Access Control and Identity Management Scenarios

Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.

Information, Registration & Payment

Back To Top
Application, Data, and Host Security Scenarios

When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.

Information, Registration & Payment

Back To Top
Asset Security

Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel down to front line employees. Various security controls will be described that help protect privacy, along with data leakage prevention (DLP). Although it is not necessary, having some foundation in IT concepts is helpful in taking this course.

The content in this course aligns with Domain Two in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Information, Registration & Payment

Back To Top
Cloud Application Security

Cloud computing and cloud-based applications are more prevalent today than ever before. Software developers must continuously challenge themselves to stay up to date securing cloud-based applications. This course begins by presenting several challenges and solutions for securing cloud-based applications. Learners are then presented with several real-world scenarios to apply the material they've learned.

This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course. This course assumes a basic understanding of internet technology.

Information, Registration & Payment

Back To Top
Cloud Data Security

This course is comprised of two modules. The first addresses many of the important concepts of cloud-based data and the security responsibilities of both cloud consumers and cloud service providers. The second module offers a series of scenarios that relate to cloud data security to ensure you have mastered the material.

This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course.

Information, Registration & Payment

Back To Top
Cloud Infrastructure and Platform Security

This course is comprised of two modules. The first addresses many of the challenges for both cloud consumers and cloud service providers in securing the infrastructure and platforms used in cloud computing. The second module offers a series of real-world scenarios designed to give learners a sense for how the concepts might be applied in their everyday work. This course is designed for IT professionals and other adult learners who have some knowledge of internet-related technology.

This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course.

Information, Registration & Payment

Back To Top
Cloud Operations Security

This course begins by covering security issues with regard to operating cloud services. While it covers many aspects relevant to a cloud service provider, it should be particularly valuable to helping cloud consumers understand how security responsibilities may be divided between consumer and provider. The second module engages the learner with real-world scenarios that represent the challenges to securing cloud operations. This course is designed for IT professionals and other adult learners who have some knowledge of internet-related technology.

This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course.

Information, Registration & Payment

Back To Top
Communication and Network Security

This course covers topics related to communications and network security. It begins with a lesson in the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners who are interested in gaining an introduction to information technology security.

The content in this course aligns with Domain Four in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

Information, Registration & Payment

Back To Top
Compliance and Operational Security Scenarios

This course contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. This course also features a number of fictional scenarios based on compliance and operational security to allow you to practice the concepts learned in the material. This course requires some basic understanding of IT concepts.

Information, Registration & Payment

Back To Top
Cryptography Scenarios

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.

This course is part of the Cybersecurity suite of courses. However, the course can be taken as a stand-alone course.

 

Information, Registration & Payment

Back To Top
Cybersecurity for Healthcare Professionals

In this course, manager's are introduced to essential information security principles and concepts. These concepts are critically important in the healthcare sector as a data breach can have far-reaching consequences for individuals and organizations. Beyond financial losses and the embarrassment of having personal information exposed online, a security breach in healthcare can result in a patient becoming seriously injured or killed.

This course is designed to help manager's navigate crucial cybersecurity concepts as applied to HITECH and HIPAA-covered entities. Learners will explore the reasons why breaches occur, the motivation of attackers, and how to protect Personal Health Information (PHI) while it is in use, in storage, and in transit across a network.

 

 

Information, Registration & Payment

Back To Top
Identity and Access Management

This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other. This course requires some basic understanding of IT concepts.

The content in this course aligns with Domain Five in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Information, Registration & Payment

Back To Top
Introduction to Cybersecurity

Globally, incidents of data breaches, identity thefts, and cybercrimes are on the rise, along with the explosive growth of online personal data and the expansion of computer networks. This course teaches the fundamental concepts of information security one will encounter in the cybersecurity field. This course will set the groundwork with basic vocabulary and then introduces concepts such as access controls, risk management, cyber attacks, and digital forensics. This course requires a basic understanding of IT concepts.

 

Information, Registration & Payment

Back To Top
Introduction to Malware

Malicious software, better known as malware, has become a central element in not just cybersecurity but daily life. It has played a role in everything from our politics to our economy, to our personal lives. However, it remains a poorly understood and reported subject. This course provides a clear and comprehensive introduction to malware and how to defend against it. Instruction is divided into two modules. The first provides an overview of the history and mechanisms of malware. The second module offers a series of real-world scenarios in which the learner must apply several of the concepts covered in the first module.

Information, Registration & Payment

Back To Top
Network Security Scenarios

This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.

 

Information, Registration & Payment

Back To Top
Security and Risk Management

This course covers the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education. This course requires some basic understanding of IT concepts.

The content in this course aligns with Domain One in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

Information, Registration & Payment

Back To Top
Security Assessment and Testing

This course covers security assessment and testing, focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Students will have the opportunity to practice how to assess the impact of disasters that may arise as well as to develop their own versions of these plans. This course requires a basic understanding of IT concepts.

Information, Registration & Payment

Back To Top
Security Engineering

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Three in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

Information, Registration & Payment

Back To Top
Security Operations

This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Seven in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

INFORMATION, REGISTRATION & PAYMENT

Back To Top
Software Development Security

This course covers software development security while focusing on the systems development life cycle, operating systems, and their environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. Students will have the opportunity to apply application security controls. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Eight in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

Information, Registration & Payment

Back To Top
Threats and Vulnerabilities Scenarios

This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real world scenarios.

Information, Registration & Payment

Back To Top

 

Disclaimer

Flagler College is accredited by the Southern Association of Colleges and Schools Commission on Colleges to award Bachelor of Arts, Bachelor of Fine Arts, and Master of Arts degrees.  Non-degree, non-credit training and development programs are not accredited by SACS Commission on Colleges, and the accreditation of Flagler College does not extend to or include these programs or its students.  Flagler College does not accept course work from these programs for credit toward any award.

 

Questions?

If you would like to discuss your options with someone from Adult and Continuing Education, please call (904) 826-8643 or email:

continuingeducation@flagler.edu